A Large-Scale Secure Image Retrieval Method in Cloud Environment

被引:21
作者
Xu, Yanyan [1 ]
Zhao, Xiao [1 ]
Gong, Jiaying [2 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Hubei, Peoples R China
[2] Ping An Technol Shenzhen Co Ltd, Shenzhen 518000, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Image retrieval; Cloud computing; Visualization; Indexes; Encryption; Large-scale image retrieval; secure image retrieval; min-Hash; hamming embedding; secure inverted index; FEATURE-EXTRACTION; ENCRYPTION; SEARCH;
D O I
10.1109/ACCESS.2019.2951175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect datas confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some basic yet important data services, such as content-based image retrieval. Existing secure image retrieval methods generally have some problems such as low retrieval accuracy and low retrieval efficiency, which cannot meet requirements for large-scale image retrieval in cloud environment. In this paper, we propose a large-scale secure image retrieval method in cloud environment. The Hamming embedding algorithm is utilized to generate binary signatures of image descriptors. A frequency histogram combined with binary signatures is generated to provide a more precise representation of image features in an image and thus the retrieval accuracy is improved. Visual words are selected from the histogram by the random sampling method before the min-Hash algorithm is performed on binary signatures of selected visual words to generate a secure index. The random sampling method and min-Hash algorithm can not only ensure the security of the search index, but also greatly improve the image retrieval efficiency. This method achieves the balance among security, accuracy and efficiency of large-scale secure image retrieval in public clouds. The security analysis and experimental results show the effectiveness of the proposed method.
引用
收藏
页码:160082 / 160090
页数:9
相关论文
共 27 条
[1]  
[Anonymous], 2009, P SPIE INT SOC OPT E
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Broder A. Z., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P327, DOI 10.1145/276698.276781
[4]   On the resemblance and containment of documents [J].
Broder, AZ .
COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, :21-29
[5]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[6]   A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval [J].
Chu, Wei-Ta ;
Chang, Feng-Chi .
ICMR'15: PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, 2015, :243-250
[7]  
Chum O., 2008, BMVC, V810, DOI [10.5244/C.22.50, DOI 10.5244/C.22.50]
[8]   Total recall: Automatic query expansion with a generative feature model for object retrieval [J].
Chum, Ondrej ;
Philbin, James ;
Sivic, Josef ;
Isard, Michael ;
Zisserman, Andrew .
2007 IEEE 11TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1-6, 2007, :496-+
[9]  
Chum Ondrej., 2007, CIVR 07, P549, DOI DOI 10.1145/1282280.1282359
[10]  
Erkin Z, 2014, LECT NOTES COMPUT SC, V8610, P359, DOI 10.1007/978-3-319-09912-5_30