Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation

Abstract Content-based image retrieval (CBIR) is one of the fundamental image retrieval primitives. Its applications can be found in various areas, such as art collections and medical diagnoses. With an increasing prevalence of cloud computing paradigm, image owners desire to outsource their images to cloud servers. In order to deal with the risk of privacy leakage of images, images are typically encrypted before they are outsourced to the cloud, which makes CBIR an extremely challenging task. Existing studies focus on the scenario with only a single image owner, leaving the problem of CBIR with multiple image sources (i.e., owners) unaddressed. In this paper, we propose a secure CBIR scheme that supports Multiple Image owners with Privacy Protection ( MIPP ). We encrypt image features with a secure multi-party computation technique, which allows image owners to encrypt image features with their own keys. This enables efficient image retrieval over images gathered from multiple sources, while guaranteeing that image privacy of an individual image owner will not be leaked to other image owners. We also propose a new method for similarity measurement of images that can avoid revealing image similarity information to the cloud. Theoretical analysis and experimental results demonstrate that MIPP achieves retrieval accuracy and efficiency simultaneously, while preserving image privacy.

[1]  Manpreet Kaur,et al.  A novel technique for content based image retrieval using color, texture and edge features , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).

[2]  James Ze Wang,et al.  Automatic Linguistic Indexing of Pictures by a Statistical Modeling Approach , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Manuel Mejia-Lavalle,et al.  The MPEG-7 Visual Descriptors: A Basic Survey , 2013, 2013 International Conference on Mechatronics, Electronics and Automotive Engineering.

[4]  Xinpeng Zhang,et al.  Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[5]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Cong Wang,et al.  Towards Privacy-Preserving and Practical Image-Centric Social Discovery , 2018, IEEE Transactions on Dependable and Secure Computing.

[8]  Mohsen Guizani,et al.  Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks , 2018, IEEE Journal on Selected Areas in Communications.

[9]  Xinpeng Zhang,et al.  Histogram-based retrieval for encrypted JPEG images , 2014, 2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP).

[10]  B. S. Manjunath,et al.  Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..

[11]  YuanYong Chen The image retrieval algorithm based on color feature , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[12]  Ping Yu,et al.  Image Retrieval Based on Color and Texture Features , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Laurent Amsaleg,et al.  Privacy-Preserving Outsourced Media Search , 2016, IEEE Transactions on Knowledge and Data Engineering.

[14]  Ching-Hung Su,et al.  An efficient image retrieval based on HSV color space , 2011, 2011 International Conference on Electrical and Control Engineering.

[15]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[16]  Abdolreza Rashno,et al.  Content-based image retrieval with color and texture features in neutrosophic domain , 2017, 2017 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA).

[17]  Xiang-Yang Li,et al.  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.

[18]  S. Suganya,et al.  Content based image retrieval system based on semantic information using color, texture and shape features , 2016, 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE'16).

[19]  S. Sathiya Devi,et al.  Content based texture image retrieval based on modified dominant directional local binary pattern , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[20]  K. Anitha Sheela,et al.  Content based image retrieval using enhanced Gabor wavelet transform , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).

[21]  Yan Zhang,et al.  A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.

[22]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[23]  N.K. Narayanan,et al.  Image retrieval using combination of color, texture and shape descriptor , 2016, 2016 International Conference on Next Generation Intelligent Systems (ICNGIS).

[24]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[25]  Chunyan Zhang,et al.  An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[26]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Shucheng Yu,et al.  SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).