Markov Process Based Retrieval for Encrypted JPEG Images

被引:10
作者
Cheng, Hang [1 ,2 ]
Zhang, Xinpeng [1 ]
Yu, Jiang [1 ]
Li, Fengyong [3 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[3] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
来源
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 | 2015年
关键词
image retrieval; image encryption; Markov process; JPEG; SEARCH;
D O I
10.1109/ARES.2015.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a retrieval scheme for encrypted JPEG images based on Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt JPEG images, which are then uploaded to a database server. After that, the server without knowing the original content can extract features from the transition probability matrices of the AC coefficients of encrypted query image, in which those coefficients are modeled by Markov process. With the multi-class support vector machine (SVM), the features of encrypted query image can be converted into a vector with low dimensionality determined by the number of image categories. The encrypted database images are conducted similarly. After low-dimensional vector representation, the similarity between encrypted query image and database image may be measured by calculating the distance of their corresponding vectors. At the client side, the encrypted images returned by the server are decrypted to the plaintext images using encryption key. The proposed scheme can preserve file compliance and file size for encrypted JPEG images, while providing privacy-preserving image retrieval.
引用
收藏
页码:417 / 421
页数:5
相关论文
共 20 条
[1]  
[Anonymous], 1992, INFORM TECHNOLOGY DI
[2]  
[Anonymous], IS T SPIE ELECT IMAG
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[5]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[6]   JPEG image steganalysis utilizing both intrablock and interblock correlations [J].
Chen, Chunhua ;
Shi, Yun Q. .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, :3029-3032
[7]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[8]  
Goh E.-J., 2003, Rep. 2003/216
[9]  
Kamara S., 2013, FINANCIAL CRYPTOGRAP, P258, DOI DOI 10.1007/978-3-642-39884-1
[10]  
Li WH, 2009, IEEE INT CON MULTI, P1034, DOI 10.1109/ICME.2009.5202674