Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing

被引:15
作者
Wang, Yu [1 ]
Chen, Liquan [1 ,2 ]
Wu, Ge [1 ]
Yu, Kunliang [1 ]
Lu, Tianyu [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210000, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preservation; Content -based image retrieval (CBIR); Neural networks; Approximate homomorphic encryption; Deep neural networks; Chaotic image encryption; FULLY HOMOMORPHIC ENCRYPTION; SCHEME;
D O I
10.1016/j.cose.2023.103163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart devices offer a variety of more convenient forms to help us record our lives and generate a large amount of data in this process. Limited by the local storage capacity, many users outsource their im-age data directly to the cloud server. However, images stored in plaintext on the cloud server are very insecure, resulting in image privacy information can be easily leaked. Therefore, users will encrypt the images and outsource them to the cloud server, but the encrypted images cannot be retrieved. Therefore, we proposed a secure and efficient ciphertext image retrieval scheme based on image content retrieval (CBIR) and approximate homomorphic encryption (HE). First, we used approximate homomorphic en-cryption to encrypt images after resizing and uploaded the ciphertext images to the cloud for feature extraction of ciphertext. At the same time, the large images (size, dimension, and resolution) would gen-erate data inflation after using homomorphic encryption. Therefore, the original images are encrypted using the chaotic image encryption scheme to reduce ciphertext size and computation costs. Second, we proposed two deepening network depth optimization strategies that address the problem of insufficient neural network depth. Finally, reducing the dimensionality of the ciphertext feature vector using locally sensitive hashing (LSH) can accelerate the retrieval of ciphertext images. Compared with other literature, our ciphertext image retrieval scheme can significantly reduce the rounds of user-server communication. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 44 条
  • [1] Image encryption based on highly sensitive chaotic system
    Ali, Dalia S.
    Alwan, Nawras A.
    Al-Saidi, Nadia M. G.
    [J]. THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019), 2019, 2183
  • [2] Bajard Jean-Claude, 2017, Selected Areas in Cryptography - SAC 2016. 23rd International Conference. Revised Selected Papers: LNCS 10532, P423, DOI 10.1007/978-3-319-69453-5_23
  • [3] EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    [J]. SIAM JOURNAL ON COMPUTING, 2014, 43 (02) : 831 - 871
  • [4] Chabanne H, 2017, CRYPTOL EPRINT ARCH, V4, P59
  • [5] Numerical Method for Comparison on Homomorphically Encrypted Numbers
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Hun Hee
    Lee, Keewoo
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 415 - 445
  • [6] Homomorphic Encryption for Arithmetic of Approximate Numbers
    Cheon, Jung Hee
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 409 - 437
  • [7] Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
  • [8] Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map
    Choi, Un Sook
    Cho, Sung Jin
    Kim, Jin Gyoung
    Kang, Sung Won
    Kim, Han Doo
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 22825 - 22842
  • [9] Chou ED, 2018, Arxiv, DOI arXiv:1811.09953
  • [10] Dowlin N, 2016, PR MACH LEARN RES, V48