Markov Process Based Retrieval for Encrypted JPEG Images

This work presents a retrieval scheme for encrypted JPEG images based on Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt JPEG images, which are then uploaded to a database server. After that, the server without knowing the original content can extract features from the transition probability matrices of the AC coefficients of encrypted query image, in which those coefficients are modeled by Markov process. With the multi-class support vector machine (SVM), the features of encrypted query image can be converted into a vector with low dimensionality determined by the number of image categories. The encrypted database images are conducted similarly. After low-dimensional vector representation, the similarity between encrypted query image and database image may be measured by calculating the distance of their corresponding vectors. At the client side, the encrypted images returned by the server are decrypted to the plaintext images using encryption key. The proposed scheme can preserve file compliance and file size for encrypted JPEG images, while providing privacy-preserving image retrieval.

[1]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[3]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[4]  Tri Van Le Efficient Provably Secure Public Key Steganography , 2003, IACR Cryptol. ePrint Arch..

[5]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[6]  Nenghai Yu,et al.  A robust chaos-based image encryption scheme , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[7]  Xinpeng Zhang,et al.  Markov process-based retrieval for encrypted JPEG images , 2016 .

[8]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[9]  Shiguo Lian,et al.  A novel image encryption scheme based-on JPEG encoding , 2004, Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..

[10]  Xinpeng Zhang,et al.  Histogram-based retrieval for encrypted JPEG images , 2014, 2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP).

[11]  H. Wu,et al.  Mixed Guassian and uniform impulse noise analysis using robust estimation for digital images , 2009, 2009 16th International Conference on Digital Signal Processing.

[12]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[13]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[14]  Hugo Krawczyk,et al.  Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..

[15]  Bian Yang,et al.  Transparent and perceptually enhanced JPEG image encryption , 2009, 2009 16th International Conference on Digital Signal Processing.

[16]  Min Wu,et al.  Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.

[17]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[19]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[20]  Jun Zhao,et al.  Edge-Guided Dual-Modality Image Reconstruction , 2014, IEEE Access.

[21]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[22]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[23]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.