Securing content-based image retrieval on the cloud using generative models

被引:0
作者
Yong Wang
Fan-chuan Wang
Fei Liu
Xiao-hu Wang
机构
[1] University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Content-based image retrieval; Generative adversarial networks (GANs); Lattice-based homomorphic scheme; secure multiparty computation; Deep neural networks (DNNs);
D O I
暂无
中图分类号
学科分类号
摘要
Content-based image retrieval (CBIR) with deep neural networks (DNNs) on the cloud has tremendous business and technical advantages to handle large-scale image repositories. However, cloud-based CBIR service raises challenges in image data and DNN model security. Typically, users who wish to request CBIR services on the cloud require their input images remaining confidential. On the other hand, image owners may intentionally (or unintentionally) upload adversarial examples to the cloud servers, which potentially leads to the misbehavior of CBIR services. Generative Adversarial Networks (GANs) can be utilized to defense against such malicious behavior. However, the GANs model, if not well protected, can be easily abused by the cloud to reconstruct the users’ original image data. In this paper, we focus on the problem of secure generative model evaluation and secure gradient descent (GD) computation in GANs. We propose two secure generative model evaluation algorithms and two secure minimizer protocols. Furthermore, we propose and implement Sec-Defense-Gan, a secure image reconstruction framework which can keep the image data, the generative model details and corresponding outputs confidential from the cloud. Finally, We carried out a set of benchmarks over two public available image datasets to show the performance and correctness of Sec-Defense-Gan.
引用
收藏
页码:31219 / 31243
页数:24
相关论文
共 26 条
[1]  
Bansal M(2021)2d object recognition: a comparative analysis of sift, surf and orb feature descriptors Multimedia Tools and Applications 80 18839-18857
[2]  
Kumar M(2021)An efficient technique for object recognition using shi-tomasi corner detection algorithm Soft Computing 25 4423-4432
[3]  
Kumar M(2020)TFHE: Fast Fully Homomorphic Encryption Over the Torus J Cryptol 33 34-91
[4]  
Bansal M(1989)The knowledge complexity of interactive proof systems SIAM J Comput 18 186-208
[5]  
Kumar M(2012)Image feature extraction in encrypted domain with privacy-preserving sift IEEE Transactions on Image Processing 21 4593-4607
[6]  
Kumar M(2016)Securing sift: privacy-preserving outsourcing computation of feature extractions over encrypted image data IEEE Transactions on Image Processing 25 3411-3425
[7]  
Kumar K(2019)Intelligent and secure content-based image retrieval for mobile users IEEE Access 7 119209-119222
[8]  
Chillotti I(undefined)undefined undefined undefined undefined-undefined
[9]  
Gama N(undefined)undefined undefined undefined undefined-undefined
[10]  
Georgieva M(undefined)undefined undefined undefined undefined-undefined