Securing visual search queries in ubiquitous scenarios empowered by smart personal devices

Abstract Smart personal devices are assuming a fundamental role in the ubiquitous communication and computing arena. They provide new sophisticated cameras and new visual search interfaces and facilities that can drastically improve their presence and role in complex IoT-based critical infrastructures, such as healthcare monitoring and emergency systems, or remote access control facilities and smart authentication services. This new scenario calls for strong secure and resilient visual query mechanisms for these devices. In this work we propose an innovative secure visual search system, which is well-suited for ubiquitous computing scenarios empowered by modern smart personal devices. More precisely, we show how to insert, at the visual data acquisition time, a watermark inside the already compressed descriptor characterizing an MPEG-CDVS data stream used in visual queries, to make it possible to decode the watermark on the server side in order to improve the robustness against image-based identity spoofing. Such a security enforcement solution may be practical in several real-life applications involving visual queries performed from personal trusted devices, and it is particularly suitable in all those application domains that require performing visual queries with a high degree of security. It has been extensively tested and achieved satisfactory results: the presence of such a watermark does not affect the image matching performance and functionality.

[1]  Maria Gradinariu Potop-Butucaru,et al.  ARMCO: Advanced topics in resource management for ubiquitous cloud computing: An adaptive approach , 2016, Future Gener. Comput. Syst..

[2]  Bruno Carpentieri,et al.  Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[3]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[4]  Bruno Carpentieri,et al.  The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[5]  Alessandro Armando,et al.  Enabling BYOD through secure meta-market , 2014, WiSec '14.

[6]  Alfredo De Santis,et al.  On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..

[7]  Qiang Zhang,et al.  Enabling Cooperative Privacy-preserving Personalized search in cloud environments , 2019, Inf. Sci..

[8]  Alfredo De Santis,et al.  On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[9]  Ling-Yu Duan,et al.  Compact descriptors for mobile visual search and MPEG CDVS standardization , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).

[10]  Giovanni Motta,et al.  Handbook of Data Compression , 2009 .

[11]  Jing-Ming Guo,et al.  Reversible data hiding in low complexity and high quality compression scheme , 2012, Digit. Signal Process..

[12]  Ciprian Dobre,et al.  Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements , 2019, Inf. Sci..

[13]  Alessandro Armando,et al.  Securing the "Bring Your Own Device" Paradigm , 2014, Computer.

[14]  Marek R. Ogiela,et al.  Digital images authentication scheme based on bimodal biometric watermarking in an independent domain , 2016, J. Vis. Commun. Image Represent..

[15]  Huizhong Chen,et al.  The stanford mobile visual search data set , 2011, MMSys.

[16]  Bernd Girod,et al.  Feature Matching Performance of Compact Descriptors for Visual Search , 2014, 2014 Data Compression Conference.

[17]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[18]  Guojun Wang,et al.  PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data , 2018, IEEE Access.

[19]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[20]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[21]  Florin Pop,et al.  Exploiting data centres energy flexibility in smart cities: Business scenarios , 2019, Inf. Sci..

[22]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .