A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing

In recent years, information leakage incidents occur frequently. Ciphertext domain search has become a hot spot in multimedia technology and software engineering. Therefore, how to mine valuable information safely and effectively is very important. In this paper, we present the CBIR solution and complete the relevant software development. The proposed method not only outsources CBIR services but also avoids privacy leaks. Our main contributions are reflected in two aspects: improving search efficiency and protecting user privacy. For one thing, we propose a novel privacy protection algorithm to encrypt images. For the other thing, we propose an integrated deep hash algorithm to extract the high-level features of images. In the index encryption process, we use secure kNN to encrypt the index. Through experimental analysis and argumentation, the proposed privacy protection algorithm has a lower correlation coefficient and a better information entropy. It is secure enough and can resist common types of attacks encountered during data transmission. The proposed secure image retrieval algorithm is tested on two datasets. Compared with the same type of algorithm, the proposed algorithm has better retrieval performance. In short, the privacy reservation scheme guarantees the security and effectiveness of the system.

[1]  Xing-yuan Wang,et al.  A fast image algorithm based on rows and columns switch , 2014, Nonlinear Dynamics.

[2]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[3]  Zhenan Sun,et al.  Fast Supervised Discrete Hashing , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[5]  Ning Xu,et al.  A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos , 2018, Int. J. Netw. Secur..

[6]  Ritu Gupta,et al.  A new image encryption algorithm based on DNA approach , 2018 .

[7]  Xiaofeng Liao,et al.  Selective encryption for gray images based on chaos and DNA complementary rules , 2014, Multimedia Tools and Applications.

[8]  Faiez Zalila,et al.  Model-Driven Elasticity Management with OCCI , 2019, IEEE Transactions on Cloud Computing.

[9]  Klaus Schöffmann,et al.  Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.

[10]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[11]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[12]  Yong Zhang,et al.  A plaintext-related image encryption algorithm based on chaos , 2017, Multimedia Tools and Applications.

[13]  Gu Jixing,et al.  Known‐plaintext attack on secure kNN computation on encrypted databases , 2014 .

[14]  Hai Jin,et al.  Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing , 2014, Comput. J..

[15]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[16]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[17]  Qiang Zhang,et al.  A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2013 .

[18]  João Leitão,et al.  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.

[19]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[20]  Rongrong Ji,et al.  Supervised hashing with kernels , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[21]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[23]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[24]  Bin Wang,et al.  Splicing Model and Hyper–Chaotic System for Image Encryption , 2016 .

[25]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[26]  Kilian Q. Weinberger,et al.  Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[27]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[28]  Xin Wang,et al.  Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing , 2018, IEEE Network.

[29]  Abdul Hanan Abdullah,et al.  Image encryption using a synchronous permutation-diffusion technique , 2017 .

[30]  Rengarajan Amirtharajan,et al.  Chaos based crossover and mutation for securing DICOM image , 2016, Comput. Biol. Medicine.

[31]  Jan Sher Khan,et al.  Chaos based efficient selective image encryption , 2018, Multidimensional Systems and Signal Processing.

[32]  Antonio Torralba,et al.  Spectral Hashing , 2008, NIPS.

[33]  Kehui Sun,et al.  A fast image encryption algorithm based on chaotic map , 2016 .

[34]  Lingfeng Liu,et al.  Image block encryption algorithm based on chaotic maps , 2017, IET Signal Process..

[35]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[36]  Gargi Bhattacharjee,et al.  A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence , 2018 .

[37]  Xingyuan Wang,et al.  A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .

[38]  M Kaur,et al.  Efficient image encryption method based on improved Lorenz chaotic system , 2018 .