PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data

被引:5
作者
Yang, Tengfei [1 ,2 ,3 ]
Ma, Jianfeng [1 ,3 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [5 ,6 ]
Wang, Xuan [7 ]
Meng, Qian [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[5] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[6] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[7] Shaanxi Normal Univ, Sch Phys & Informat Technol, Xian 710062, Shaanxi, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Privacy preserving; Legendre circularly orthogonal moment; Homomorphic encryption; Image reconstruction; Image recognition; FULLY HOMOMORPHIC ENCRYPTION; FEATURE-EXTRACTION; CLOUD; LATTICES; DOMAIN;
D O I
10.1016/j.ins.2019.07.078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the image outsourcing system, image privacy is still an increasing concern since the cloud service provider and image owners are not in the same trusted domain. The most straightforward method for guaranteeing image privacy is to leverage cryptographic tools, but traditional cryptographic tools make feature extraction algorithms useless. To this end, we propose a privacy-preserving feature extraction scheme for Legendre circularly orthogonal moment, which is a novel global feature descriptor and can be used for image analysis. We first develop a novel feature descriptor, which is one of the circularly orthogonal moments and termed as Legendre Circularly Orthogonal Moment (LCOM). Then, we present a mathematical framework for implementing Privacy-preserving Legendre Circularly Orthogonal Moment (PLCOM) by combining LCOM and somewhat homomorphic encryption, and implement the image reconstruction in the encrypted domain based on PLCOM. Besides, the detailed theoretical analysis of message space and expanding factor generated by the quantitative technology shows that LCOM and image reconstruction in the plaintext domain can be realized with the aid of PLCOM. Finally, experimental results verify that the PLCOM's performance in terms of image reconstruction capability and image recognition accuracy is acceptable. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:198 / 214
页数:17
相关论文
共 48 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
[Anonymous], 2014, P 2014 IEEE INT C MU, DOI DOI 10.1109/ICME.2014.6890170
[3]  
[Anonymous], 2018, IEEE Trans Serv Comput
[4]  
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[5]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[6]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[7]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[8]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[9]  
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
[10]  
Gentry C, 2008, ACM S THEORY COMPUT, P197