A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding

被引:1
作者
Jiang, Mingfang [1 ]
Sun, Guang [2 ]
机构
[1] Hunan First Normal Univ, Dept Informat Sci & Engn, Changsha 410205, Hunan, Peoples R China
[2] Hunan Univ Finance & Econ, Res Inst Finance & Econ Big Data, Changsha 410073, Hunan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Searchable image encryption; Henon chaotic map; Block Truncation Coding;
D O I
10.1007/978-3-030-00012-7_32
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable image encryption algorithm based on Block Truncation Coding (BTC) and Henon chaotic map is presented. Henon Chaotic map is used to encrypt two quantization levels of BTC compressed images, and a pseudo random sequence is created by chaotic map to scramble the bit plane of each sub-block. The feature value of each sub-block is computed according to the relationship between the number of 1s and 0s in the corresponding bit plane. The encrypted image retrieval can be achieved by comparing the normalized correlation coefficients between the feature vectors. Experimental results show that the proposed scheme has satisfactory retrieval accuracy and security. Meanwhile, it has low computational cost and can be used for encrypted images retrieval in the cloud.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 13 条
[1]   IMAGE COMPRESSION USING BLOCK TRUNCATION CODING [J].
DELP, EJ ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (09) :1335-1342
[2]  
Hyma J., 2016, International Journal of Applied Engineering Research, V11, P7509, DOI DOI 10.37622/IJAER/11.11.2016.7509-7516
[3]  
Kamal AAAM, 2017, ASIAPAC SIGN INFO PR, P1495, DOI 10.1109/APSIPA.2017.8282269
[4]   ABSOLUTE MOMENT BLOCK TRUNCATION CODING AND ITS APPLICATION TO COLOR IMAGES [J].
LEMA, MD ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (10) :1148-1157
[5]   Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization [J].
Lu, Wenjun ;
Varna, Avinash L. ;
Wu, Min .
IEEE ACCESS, 2014, 2 :125-141
[6]  
Poh GS, 2017, ACM COMPUT SURV, V50, P1
[7]   Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update [J].
Sun, Xingming ;
Zhou, Lu ;
Fu, Zhangjie ;
Wang, Jin .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06) :1-16
[8]   A Simple and Rapid Turn On ESIPT Fluorescent Probe for Colorimetric and Ratiometric Detection of Biothiols in Living Cells [J].
Wang, Yi ;
Zhu, Meiqing ;
Jiang, Erkang ;
Hua, Rimao ;
Na, Risong ;
Li, Qing X. .
SCIENTIFIC REPORTS, 2017, 7
[9]   A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation [J].
Xia, Zhihua ;
Zhu, Yi ;
Sun, Xingming ;
Wang, Jin .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (06) :71-80
[10]  
Yi Zhu, 2014, Information Technology Journal, V13, P824, DOI 10.3923/itj.2014.824.831