Secure content based image retrieval for mobile users with deep neural networks in the cloud

被引:13
作者
Hassan, Abdelrhman [1 ]
Liu, Fei [1 ]
Wang, Fanchuan [1 ]
Wang, Yong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Peoples R China
关键词
Content-based image retrieval; Convolutional neural network (CNN); Lattice-based homomorphic scheme; Secure multiparty computation; FEATURE-EXTRACTION;
D O I
10.1016/j.sysarc.2021.102043
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the tremendous growth of smart mobile devices, the Content-Based Image Retrieval (CBIR) becomes popular and has great market potentials. Secure image retrieval has attracted considerable interests recently due to the outsourcing of CBIR onto the cloud. In this paper, we propose and implement a secure CBIR framework that performs image retrieval on the cloud without the user's interaction. A pre-trained generic DNN model (e.g., VGG-16) is used to extract the feature vectors of an image on the user side. The cloud servers perform secure image inference with a private pre-trained DNN model and execute Approximate Nearest Neighbor (ANN) image retrieval protocols without the user's anymore interaction. We design and implement a set of protocols for the secure evaluation of the non-linear functions in DNNs. The information about the image contents, the private DNN model parameters, the intermediate and the retrieval results is strictly concealed by the conjunctive use of the lattice-based homomorphic scheme and two-party computation (2-PC) techniques. We further propose a secure image similarity scoring and a result sorting protocols, which enable the cloud servers to compare and sort images without knowing any information about their features or contents. The comprehensive experimental results show that our framework is efficient, accurate and secure.
引用
收藏
页数:17
相关论文
共 59 条
  • [1] Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
  • [2] [Anonymous], 2016, MSRTR20163
  • [3] [Anonymous], 2015, NDSS
  • [4] Araki T., 2018, CRYPTOLOGY EPRINT AR
  • [5] Batcher K. E., 1968, P APR 30 MAY 2 1968, P307, DOI DOI 10.1145/1468075.1468121
  • [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [7] Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
  • [8] Brakerski Z., 2014, ACM Trans. on Com. T, V6, P13
  • [9] Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
    Brakerski, Zvika
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 868 - 886
  • [10] Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29