Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications

被引:16
作者
Zhang, Zongye [1 ]
Zhou, Fucai [1 ]
Qin, Shiyue [2 ]
Jia, Qiang [1 ]
Xu, Zifeng [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 100819, Peoples R China
[2] Northeastern Univ, Sch Comp Sci & Engn, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Image retrieval; Access control; Feature extraction; Indexes; Privacy; Cloud computing; image sharing; multimedia; privacy-preserving; SEARCH; EFFICIENT; FEATURES;
D O I
10.1109/ACCESS.2020.2984916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every day social multimedia applications generate millions of images. To handle such huge amount of images, an optimal solution is using the public cloud, since it has powerful storage capability. Images usually contain a wealth of sensitive information, therefore social service providers need not only to provide services such as retrieval and sharing but also to protect the privacies of the images. In this paper, we propose a privacy-preserving scheme for content-based image retrieval and sharing in social multimedia applications. First, the users extract visual features from the images, and perform locality-sensitive hashing functions on visual features to generate image profile vectors. We then model the retrieval on the images as the equality search on the image profile vectors. To enable accurate and efficient retrieval, we design the secure index structure based on cuckoo hashing, which has constant lookup time. To meet the requirements of dynamic image updating, we enrich our service with image insertion and deletion. In order to reduce the key management overhead and the access control overhead in social applications, we process keys using secret sharing techniques to enable the users holding similar images to query and decrypt images independently. Finally we implement the prototype of the proposed scheme, and perform experiments over encrypted image databases.
引用
收藏
页码:66828 / 66838
页数:11
相关论文
共 26 条
[1]   Image-centric Social Discovery Using Neural Network under Anonymity Constraint [J].
Ahmed, Kazi Wasif ;
Hasan, Mohammad Zahidul ;
Mohammed, Noman .
2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2017), 2017, :238-244
[2]  
[Anonymous], 2014, ARXIV14082927
[3]  
[Anonymous], 2007, P INT C VER LARG DAT
[4]  
[Anonymous], 2006 IEEE COMPUTER S
[5]  
[Anonymous], 2008, COMPUT VIS IMAGE UND
[6]   Masking Fuzzy-Searchable Public Databases [J].
Boldyreva, Alexandra ;
Tang, Tianxin ;
Warinschi, Bogdan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 :571-591
[7]   Efficient Fuzzy Search on Encrypted Data [J].
Boldyreva, Alexandra ;
Chenette, Nathan .
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 :613-633
[8]   A Hybrid Approach to Surface Segmentation of Sparse Triangle Meshes [J].
Dong, Fangmin ;
Zhang, Rui ;
Liu, Yong .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, :669-674
[9]  
Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
[10]  
Indyk P., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P604, DOI 10.1145/276698.276876