A Large-Scale Secure Image Retrieval Method in Cloud Environment

With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect data’s confidentiality, images need to be encrypted before being outsourced to clouds, but this brings difficulties to some basic yet important data services, such as content-based image retrieval. Existing secure image retrieval methods generally have some problems such as low retrieval accuracy and low retrieval efficiency, which cannot meet requirements for large-scale image retrieval in cloud environment. In this paper, we propose a large-scale secure image retrieval method in cloud environment. The Hamming embedding algorithm is utilized to generate binary signatures of image descriptors. A frequency histogram combined with binary signatures is generated to provide a more precise representation of image features in an image and thus the retrieval accuracy is improved. Visual words are selected from the histogram by the random sampling method before the min-Hash algorithm is performed on binary signatures of selected visual words to generate a secure index. The random sampling method and min-Hash algorithm can not only ensure the security of the search index, but also greatly improve the image retrieval efficiency. This method achieves the balance among security, accuracy and efficiency of large-scale secure image retrieval in public clouds. The security analysis and experimental results show the effectiveness of the proposed method.

[1]  Andrew Zisserman,et al.  Near Duplicate Image Detection: min-Hash and tf-idf Weighting , 2008, BMVC.

[2]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[3]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[4]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[5]  Andrew Zisserman,et al.  Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[6]  David Nistér,et al.  Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[7]  Zhihua Xia,et al.  Secure Image LBP Feature Extraction in Cloud-Based Smart Campus , 2018, IEEE Access.

[8]  Hao Li,et al.  An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing , 2019, IEEE Access.

[9]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[10]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[11]  Michael Isard,et al.  General Theory , 1969 .

[12]  Pietro Perona,et al.  A Bayesian hierarchical model for learning natural scene categories , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[13]  João Leitão,et al.  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.

[14]  Yun Q. Shi,et al.  A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..

[15]  Jie Li,et al.  Privacy-Preserving Emotion Detection for Crowd Management , 2014, AMT.

[16]  Andrei Z. Broder,et al.  On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).

[17]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[18]  Michael Isard,et al.  Object retrieval with large vocabularies and fast spatial matching , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[19]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[20]  Min Wu,et al.  Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.

[21]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[22]  Zhihua Xia,et al.  BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing , 2019, IEEE Transactions on Services Computing.

[23]  Cordelia Schmid,et al.  Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.

[24]  Alan M. Frieze,et al.  Min-wise independent permutations (extended abstract) , 1998, STOC '98.

[25]  Wei-Ta Chu,et al.  A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval , 2015, ICMR.

[26]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[27]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.