Secured Outsourced Content Based Image Retrieval Based on Encrypted Signatures Extracted From Homomorphically Encrypted Images

In this paper, we present a novel Secured Outsourced Content Based Image Retrieval solution, which allows looking for similar images stored into the cloud in a homomorphically encrypted form. Its originality is fourfold. In a first time, it extracts from a Paillier encrypted image a wavelet based global image signature. In second, this signature is extracted in an encrypted form and gives no clues about the image content. In a third time, its calculation does not require the cloud to communicate with a trusted third party as usually proposed by other existing schemes. More clearly, all computations required in order to look for similar images are conducted by the cloud only with no extra-communications. To make possible such a computation, we propose a new fast way to compare encrypted data, these ones being encrypted by the same public key or not, and using a recursive relationship in-between Paillier random values when computing the different resolution levels of the image wavelet transform. Experiments conducted in two distinct frameworks: medical image retrieval with as purpose diagnosis aid support, and face recognition for user authentication; indicate that the proposed SOCBIR does not change image retrieval performance.

[1]  Thijs Veugen,et al.  Improving the DGK comparison protocol , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[2]  Gwénolé Quellec,et al.  An end to end secure CBIR over encrypted medical database , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[3]  Gwénolé Quellec,et al.  Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[4]  Luís A. Bastião Silva,et al.  Sharing medical imaging over the cloud services , 2012 .

[5]  Abdelkarim Erradi,et al.  Paillier's encryption: Implementation and cloud applications , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).

[6]  Yu Bai,et al.  Surf feature extraction in encrypted domain , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[7]  Kui Ren,et al.  Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[8]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[9]  Thomas Schneider,et al.  Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.

[10]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[11]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[12]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[13]  Cong Wang,et al.  Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.

[14]  Dan POPESCU,et al.  HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING , 2015 .

[15]  Cong Wang,et al.  SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[16]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[18]  Gwénolé Quellec,et al.  Wavelet optimization for content-based image retrieval in medical databases , 2010, Medical Image Anal..

[19]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[20]  Kui Ren,et al.  Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[21]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[22]  Wei Pan,et al.  Privacy protection and security in eHealth cloud platform for medical image sharing , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[23]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[24]  William Gasarch A Survey on Private Information Retrieval , 2004 .

[25]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[26]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.