BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing

被引:60
作者
Xia, Zhihua [1 ,2 ,3 ]
Jiang, Leqi [1 ,2 ]
Liu, Dandan [1 ,2 ]
Lu, Lihua [1 ,2 ]
Jeon, Byeungwoo [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] Sungkyunkwan Univ, Coll Informat & Commun Engn, Seoul 03063, South Korea
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Searchable encryption; computation outsourcing; content-based image retrieval; bag-of-words; ALGORITHM; FEATURES; SEARCH;
D O I
10.1109/TSC.2019.2927215
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content-based Image Retrieval (CBIR) techniques have been extensively studied with the rapid growth of digital images. Generally, CBIR service is quite expensive in computational and storage resources. Thus, it is a good choice to outsource CBIR service to the cloud server that is equipped with enormous resources. However, the privacy protection becomes a big problem, as the cloud server cannot be fully trusted. In this paper, we propose an outsourced CBIR scheme based on a novel bag-of-encrypted-words (BOEW) model. The image is encrypted by color value substitution, block permutation, and intra-block pixel permutation. Then, the local histograms are calculated from the encrypted image blocks by the cloud server. All the local histograms are clustered together, and the cluster centers are used as the encrypted visual words. In this way, the bag-of-encrypted-words (BOEW) model is built to represent each image by a feature vector, i.e., a normalized histogram of the encrypted visual words. The similarity between images can be directly measured by the Manhattan distance between feature vectors on the cloud server side. Experimental results and security analysis on the proposed scheme demonstrate its search accuracy and security.
引用
收藏
页码:202 / 214
页数:13
相关论文
共 48 条
[1]   Content-Based Image Retrieval in Radiology: Current Status and Future Directions [J].
Akgul, Ceyhun Burak ;
Rubin, Daniel L. ;
Napel, Sandy ;
Beaulieu, Christopher F. ;
Greenspan, Hayit ;
Acar, Burak .
JOURNAL OF DIGITAL IMAGING, 2011, 24 (02) :208-222
[2]  
[Anonymous], 2009, P SPIE INT SOC OPT E
[3]  
[Anonymous], 2008, COMPUT VIS IMAGE UND, DOI DOI 10.1016/j.cviu.2007.09.014
[4]  
Bellafqira R, 2016, IEEE ENG MED BIO, P2537, DOI 10.1109/EMBC.2016.7591247
[5]  
Bellafqira R, 2015, IEEE ENG MED BIO, P2944, DOI 10.1109/EMBC.2015.7319009
[6]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[7]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[8]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[9]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[10]   Markov process-based retrieval for encrypted JPEG images [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang ;
Li, Fengyong .
EURASIP JOURNAL ON INFORMATION SECURITY, 2016, 2016 (01) :1-9