ImageProof: Enabling Authentication for Large-Scale Image Retrieval

被引:14
作者
Guo, Shangwei [1 ]
Xu, Jianliang [1 ]
Zhang, Ce [1 ]
Xu, Cheng [1 ]
Xiang, Tao [2 ]
机构
[1] Hong Kong Baptist Univ, Dept Comp Sci, Hong Kong, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
来源
2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019) | 2019年
基金
中国国家自然科学基金;
关键词
EFFICIENT VERIFICATION; QUERY;
D O I
10.1109/ICDE.2019.00099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosive growth of online images and the popularity of search engines, a great demand has arisen for small and medium-sized enterprises to build and outsource large-scale image retrieval systems to cloud platforms. While reducing storage and retrieval burdens, enterprises are at risk of facing untrusted cloud service providers. In this paper, we take the first step in studying the problem of query authentication for large-scale image retrieval. Due to the large size of image files, the main challenges are to (i) design efficient authenticated data structures (ADSs) and (ii) balance search, communication, and verification complexities. To address these challenges, we propose two novel ADSs, the Merkle randomized k-d tree and the Merkle inverted index with cuckoo filters, to ensure the integrity of query results in each step of image retrieval. For each ADS, we develop corresponding search and verification algorithms on the basis of a series of systemic design strategies. Furthermore, we put together the ADSs and algorithms to design the final authentication scheme for image retrieval, which we name ImageProof. We also propose several optimization techniques to improve the performance of the proposed ImageProof scheme. Security analysis and extensive experiments are performed to show the robustness and efficiency of ImageProof.
引用
收藏
页码:1070 / 1081
页数:12
相关论文
共 33 条
[1]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[2]   Total recall: Automatic query expansion with a generative feature model for object retrieval [J].
Chum, Ondrej ;
Philbin, James ;
Sivic, Josef ;
Isard, Michael ;
Zisserman, Andrew .
2007 IEEE 11TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1-6, 2007, :496-+
[3]   Cuckoo Filter: Practically Better Than Bloom [J].
Fan, Bin ;
Andersen, David G. ;
Kaminsky, Michael ;
Mitzenrnacher, Michael D. .
PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, :75-87
[4]   Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers [J].
Goodrich, Michael T. ;
Nguyen, Duy ;
Ohrimenko, Olga ;
Papamanthou, Charalampos ;
Tamassia, Roberto ;
Triandopoulos, Nikos ;
Lopes, Cristina Videira .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 5 (10) :920-931
[5]  
Hu H., 2018, SIGKDD
[6]  
Hu Haibo., 2012, P ACM SIGMOD INT C M, P301
[7]  
Huiskes M.J., 2010, P INT C MULT INF RET, P527, DOI 10.1145/1743384.1743475
[8]   Visual Search at Pinterest [J].
Jing, Yushi ;
Liu, David ;
Kislyuk, Dmitry ;
Zhai, Andrew ;
Xu, Jiajing ;
Donahue, Jeff ;
Tavel, Sarah .
KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2015, :1889-1898
[9]  
Kahney L., 2001, WIRED MAGAZINE, V2
[10]  
Li F., 2006, P ACM SIGMOD INT C M, P121, DOI DOI 10.1145/1142473.1142488