BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing

被引:62
作者
Xia, Zhihua [1 ,2 ,3 ]
Jiang, Leqi [1 ,2 ]
Liu, Dandan [1 ,2 ]
Lu, Lihua [1 ,2 ]
Jeon, Byeungwoo [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[3] Sungkyunkwan Univ, Coll Informat & Commun Engn, Seoul 03063, South Korea
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Searchable encryption; computation outsourcing; content-based image retrieval; bag-of-words; ALGORITHM; FEATURES; SEARCH;
D O I
10.1109/TSC.2019.2927215
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content-based Image Retrieval (CBIR) techniques have been extensively studied with the rapid growth of digital images. Generally, CBIR service is quite expensive in computational and storage resources. Thus, it is a good choice to outsource CBIR service to the cloud server that is equipped with enormous resources. However, the privacy protection becomes a big problem, as the cloud server cannot be fully trusted. In this paper, we propose an outsourced CBIR scheme based on a novel bag-of-encrypted-words (BOEW) model. The image is encrypted by color value substitution, block permutation, and intra-block pixel permutation. Then, the local histograms are calculated from the encrypted image blocks by the cloud server. All the local histograms are clustered together, and the cluster centers are used as the encrypted visual words. In this way, the bag-of-encrypted-words (BOEW) model is built to represent each image by a feature vector, i.e., a normalized histogram of the encrypted visual words. The similarity between images can be directly measured by the Manhattan distance between feature vectors on the cloud server side. Experimental results and security analysis on the proposed scheme demonstrate its search accuracy and security.
引用
收藏
页码:202 / 214
页数:13
相关论文
共 48 条
[11]  
Clark A., 1997, CRYPTOLOGIA, V21, P129
[12]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[13]   Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :784-798
[14]   Privacy-Preserving Content-Based Image Retrieval in the Cloud [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, :11-20
[15]   Searchable Encryption with Secure and Efficient Updates [J].
Hahn, Florian ;
Kerschbaum, Florian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :310-320
[16]  
Jegou H, 2008, LECT NOTES COMPUT SC, V5302, P304, DOI 10.1007/978-3-540-88682-2_24
[17]   On the Security of Permutation-Only Image Encryption Schemes [J].
Jolfaei, Alireza ;
Wu, Xin-Wen ;
Muthukkumarasamy, Vallipuram .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :235-246
[18]   Genetic K-means algorithm [J].
Krishna, K ;
Murty, MN .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1999, 29 (03) :433-439
[19]   Efficient Similarity Search over Encrypted Data [J].
Kuzu, Mehmet ;
Islam, Mohammad Saiful ;
Kantarcioglu, Murat .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1156-1167
[20]   Comparison of full-field digital mammography with screen-film mammography for cancer detection: Results of 4,945 paired examinations [J].
Lewin, JM ;
Hendrick, RE ;
D'Orsi, CJ ;
Isaacs, PK ;
Moss, LJ ;
Karellas, A ;
Sisney, GA ;
Kuni, CC ;
Cutter, GR .
RADIOLOGY, 2001, 218 (03) :873-880