A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

被引:39
作者
Xia, Zhihua [1 ]
Lu, Lihua [1 ]
Qin, Tong [1 ]
Shim, H. J. [1 ]
Chen, Xianyi [1 ]
Jeon, Byeungwoo [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] Sungkyunkwan Univ, Coll Informat & Commun Engn, Seoul, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 58卷 / 01期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Image retrieval; AC-coefficients histogram; color histogram; discrete cosine transform; SEARCH; SECURE; EFFICIENT; SCHEME;
D O I
10.32604/cmc.2019.02688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this scheme, the discrete cosine transform (DCT) is performed on the Y component. The resulting DC coefficients are encrypted with stream cipher technology and the resulting AC coefficients as well as other two color components are encrypted with value permutation and position scrambling. Then the image owner transmits the encrypted images to the cloud server. When receiving a query trapdoor form on query user, the server extracts AC-coefficients histogram from the encrypted Y component and extracts two color histograms from the other two color components. The similarity between query trapdoor and database image is measured by calculating the Manhattan distance of their respective histograms. Finally, the encrypted images closest to the query image are returned to the query user.
引用
收藏
页码:27 / 43
页数:17
相关论文
共 40 条
[1]  
Abduljabbar Z. A., 2017, PRIVACY PRESERVING I, P799
[2]  
Abdulsada A., 2013, INT J ENG ADV TECHNO
[3]   Content-Based Image Retrieval in Radiology: Current Status and Future Directions [J].
Akgul, Ceyhun Burak ;
Rubin, Daniel L. ;
Napel, Sandy ;
Beaulieu, Christopher F. ;
Greenspan, Hayit ;
Acar, Burak .
JOURNAL OF DIGITAL IMAGING, 2011, 24 (02) :208-222
[4]  
[Anonymous], 2006, P ACM CCS
[5]  
[Anonymous], IEEE T INF FORENSICS
[6]  
[Anonymous], IEEE T CLOUD COMPUTI
[7]  
Bellafqira R, 2015, IEEE ENG MED BIO, P2944, DOI 10.1109/EMBC.2015.7319009
[8]   A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering [J].
Cai, Zhiping ;
Wang, Zhijun ;
Zheng, Kai ;
Cao, Jiannong .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) :417-427
[9]   Coverless Information Hiding Based on the Molecular Structure Images of Material [J].
Cao, Yi ;
Zhou, Zhili ;
Sun, Xingming ;
Gao, Chongzhi .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 54 (02) :197-207
[10]  
Cavallaro A., 2017, IEEE SIGNAL PROCESS, V30, P82