Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization

被引:71
作者
Lu, Wenjun [1 ]
Varna, Avinash L. [2 ]
Wu, Min [3 ,4 ]
机构
[1] Google, Mountain View, CA 95014 USA
[2] Intel Corp, Phoenix, AZ 85226 USA
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[4] Univ Maryland, Inst Adv Comp Studies, College Pk, MD 20742 USA
关键词
Content based image retrieval; secure search; secure cloud computing; homomorphic encryption; visual words; min-hash; random projection; order preserving encryption; RETRIEVAL;
D O I
10.1109/ACCESS.2014.2307057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have seen increasing popularity of storing and managing personal multimedia data using online services. Preserving confidentiality of online personal data while offering efficient functionalities thus becomes an important and pressing research issue. In this paper, we study the problem of content-based search of image data archived online while preserving content confidentiality. The problem has different settings from those typically considered in the secure computation literature, as it deals with data in rank-ordered search, and has a different security-efficiency requirement. Secure computation techniques, such as homomorphic encryption, can potentially be used in this application, at a cost of high computational and communication complexity. Alternatively, efficient techniques based on randomizing visual feature and search indexes have been proposed recently to enable similarity comparison between encrypted images. This paper focuses on comparing these two major paradigms of techniques, namely, homomorphic encryption based techniques and feature/index randomization-based techniques, for confidentiality-preserving image search. We develop novel and systematic metrics to quantitatively evaluate security strength in this unique type of data and applications. We compare these two paradigms of techniques in terms of their search performance, security strength, and computational efficiency. The insights obtained through this paper and comparison will help design practical algorithms appropriate for privacy-aware cloud multimedia systems.
引用
收藏
页码:125 / 141
页数:17
相关论文
共 43 条
[31]   A joint signal processing and cryptographic approach to multimedia encryption [J].
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (07) :2061-2075
[32]   SCiFI - A System for Secure Face Identification [J].
Osadchy, Margarita ;
Pinkas, Benny ;
Jarrous, Ayman ;
Moskovich, Boaz .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :239-254
[33]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[34]   Secure and Robust Iris Recognition Using Random Projections and Sparse Representations [J].
Pillai, Jaishanker K. ;
Patel, Vishal M. ;
Chellappa, Rama ;
Ratha, Nalini K. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2011, 33 (09) :1877-1893
[35]  
Sadeghi AR, 2010, LECT NOTES COMPUT SC, V5984, P229
[36]  
Smart NP, 2010, LECT NOTES COMPUT SC, V6056, P420
[37]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[38]  
Stehlé D, 2010, LECT NOTES COMPUT SC, V6477, P377, DOI 10.1007/978-3-642-17373-8_22
[39]  
Swaminathan A, 2007, STORAGE SS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON STORAGE SECURITY AND SURVIVABILITY, P7
[40]  
van Dijk M, 2010, LECT NOTES COMPUT SC, V6110, P24