A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing

被引:19
作者
Wang, Zhangdong [1 ]
Qin, Jiaohua [1 ]
Xiang, Xuyu [1 ]
Tan, Yun [1 ]
机构
[1] Cent South Univ Forestry & Technol, Coll Comp Sci & Informat Technol, Changsha 410004, Peoples R China
基金
中国国家自然科学基金;
关键词
Traitor tracking; Searchable encryption; Privacy preserving; Cloud server;
D O I
10.1007/s00530-020-00734-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.
引用
收藏
页码:403 / 415
页数:13
相关论文
共 24 条
[1]   AC-coefficient histogram-based retrieval for encrypted JPEG images [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13791-13803
[2]   Improved Embedding for Prediction-Based Reversible Watermarking [J].
Coltuc, Dinu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :873-882
[3]   Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :784-798
[4]   Efficient Reversible Data Hiding Based on Multiple Histograms Modification [J].
Li, Xiaolong ;
Zhang, Weiming ;
Gui, Xinlu ;
Yang, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :2016-2027
[5]   Secure image retrieval with multiple keys [J].
Liang, Haihua ;
Zhang, Xinpeng ;
Wei, Qiuhan ;
Cheng, Hang .
JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (02)
[6]   Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping [J].
Liu, Qiang ;
Xiang, Xuyu ;
Qin, Jiaohua ;
Tan, Yun ;
Tan, Junshan ;
Luo, Yuanjing .
KNOWLEDGE-BASED SYSTEMS, 2020, 192
[7]   Coverless real-time image information hiding based on image block matching and dense convolutional network [J].
Luo, Yuanjing ;
Qin, Jiaohua ;
Xiang, Xuyu ;
Tan, Yun ;
Liu, Qiang ;
Xiang, Lingyun .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) :125-135
[8]  
Luo Yuanjing, 2020, IEEE T CIRCUITS SYST
[9]   Searchable Encrypted Image Retrieval Based on Multi-Feature Adaptive Late-Fusion [J].
Ma, Wentao ;
Qin, Jiaohua ;
Xiang, Xuyu ;
Tan, Yun ;
He, Zhibin .
MATHEMATICS, 2020, 8 (06)
[10]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362