A Secure JPEG Image Retrieval Method in Cloud Environment

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this lead to difficulties in image retrieval. A secure JPEG image retrieval method is proposed in this paper. Image is encrypted on DCT (Discrete Cosine Transform) domain by scrambling encryption, and the encrypted image is outsourced to the server, then the DC difference histogram and LBP (Local Binary Patterns) among the image blocks are extracted as image feature vectors by the server. Both the image confidentiality and retrieval accuracy are guaranteed in the proposed method with less computational complexity and communication cost. Experimental results prove that the proposed scheme has good encryption security and can achieve better retrieval performance.

[1]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[2]  Chen Ta Algorithm of Joint Hyperspectrum Image Compression and Encryption Based on Optimal Spectrum Prediction of Inter-Band,SPIHT and Chaos Mapping , 2014 .

[3]  Anthony Vetro,et al.  Quantized embeddings: an efficient and universal nearest neighbor method for cloud-based image retrieval , 2013, Optics & Photonics - Optical Engineering + Applications.

[4]  Masahiro Yagisawa,et al.  Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..

[5]  Benjamin Piwowarski,et al.  Measurement, Theory , 2022 .

[6]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[7]  Dhanya Bibin IMAGE CLASSIFICATION USING ARTIFICIAL NEURAL NETWORKS: AN EXPERIMENTAL STUDY ON COREL DATABASE , 2011 .

[8]  Rong-Tai Chen,et al.  A smart content-based image retrieval system based on color and texture feature , 2009, Image Vis. Comput..

[9]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[10]  Hector Garcia-Molina,et al.  The SIFT information dissemination system , 1999, TODS.

[11]  Marcel Worring,et al.  Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Gerald Schaefer,et al.  DC Stream Based JPEG Compressed Domain Image Retrieval , 2012, AMT.

[14]  Gang Chen,et al.  Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.

[15]  Kannan Karthik,et al.  Transparent hashing in the encrypted domain for privacy preserving image retrieval , 2013, Signal Image Video Process..

[16]  Feng Liu,et al.  Visual Cryptography for Image Processing and Security , 2014, Springer International Publishing.