Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing

被引:15
作者
Wang, Yu [1 ]
Chen, Liquan [1 ,2 ]
Wu, Ge [1 ]
Yu, Kunliang [1 ]
Lu, Tianyu [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210000, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preservation; Content -based image retrieval (CBIR); Neural networks; Approximate homomorphic encryption; Deep neural networks; Chaotic image encryption; FULLY HOMOMORPHIC ENCRYPTION; SCHEME;
D O I
10.1016/j.cose.2023.103163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart devices offer a variety of more convenient forms to help us record our lives and generate a large amount of data in this process. Limited by the local storage capacity, many users outsource their im-age data directly to the cloud server. However, images stored in plaintext on the cloud server are very insecure, resulting in image privacy information can be easily leaked. Therefore, users will encrypt the images and outsource them to the cloud server, but the encrypted images cannot be retrieved. Therefore, we proposed a secure and efficient ciphertext image retrieval scheme based on image content retrieval (CBIR) and approximate homomorphic encryption (HE). First, we used approximate homomorphic en-cryption to encrypt images after resizing and uploaded the ciphertext images to the cloud for feature extraction of ciphertext. At the same time, the large images (size, dimension, and resolution) would gen-erate data inflation after using homomorphic encryption. Therefore, the original images are encrypted using the chaotic image encryption scheme to reduce ciphertext size and computation costs. Second, we proposed two deepening network depth optimization strategies that address the problem of insufficient neural network depth. Finally, reducing the dimensionality of the ciphertext feature vector using locally sensitive hashing (LSH) can accelerate the retrieval of ciphertext images. Compared with other literature, our ciphertext image retrieval scheme can significantly reduce the rounds of user-server communication. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 44 条
  • [41] Xu, 2004, SIGMOD, P563
  • [42] SSIR: Secure similarity image retrieval in IoT
    Yan, Hongyang
    Chen, Zhe
    Jia, Chunfu
    [J]. INFORMATION SCIENCES, 2019, 479 : 153 - 163
  • [43] An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions
    Zefreh, Ebrahim Zarei
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (33-34) : 24993 - 25022
  • [44] Efficient and secure encrypted image search in mobile cloud computing
    Zou, Qin
    Wang, Jianfeng
    Ye, Jun
    Shen, Jian
    Chen, Xiaofeng
    [J]. SOFT COMPUTING, 2017, 21 (11) : 2959 - 2969