EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

Abstract The content-based image retrieval (CBIR) has been widely studied along with the increasing importance of images in our daily life. Compared with the text documents, images consume much more storage and thus are very suitable to be stored on the cloud servers. The outsourcing of CBIR to the cloud servers can be a very typical service in cloud computing. For the privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before being outsourced, which will cause the CBIR technologies in plaintext domain unusable. In this paper, we propose a scheme that supports CBIR over the encrypted images without revealing the sensitive information to the cloud server. Firstly, the feature vectors are extracted to represent the corresponding images. Then, the pre-filter tables are constructed with the locality-sensitive hashing to increase the search efficiency. Next, the feature vectors are protected by the secure k-nearest neighbor (kNN) algorithm. The security analysis and experiments show the security and efficiency of the proposed scheme.

[1]  G. Hema,et al.  Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re Encryption Function for E-Health Clouds , 2018 .

[2]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Cong Wang,et al.  Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.

[4]  Xingming Sun,et al.  Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Peijia Zheng,et al.  An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.

[7]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[9]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[10]  Gang Chen,et al.  Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.

[11]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[12]  Jianwei Yin,et al.  System resource utilization analysis and prediction for cloud based applications under bursty workloads , 2014, Inf. Sci..

[13]  Dickson K. W. Chiu,et al.  Efficient and robust large medical image retrieval in mobile cloud computing environment , 2014, Inf. Sci..

[14]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[15]  Gábor Terstyánszky,et al.  Buttressing volatile desktop grids with cloud resources within a reconfigurable environment service for workflow orchestration , 2014, Journal of Cloud Computing.

[16]  Kui Ren,et al.  SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud , 2016, AsiaCCS.

[17]  Xuemin Shen,et al.  Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.

[18]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[19]  Yu Bai,et al.  Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.

[20]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[21]  Xinpeng Zhang,et al.  Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[22]  Zhihua Xia,et al.  Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.

[23]  Petros Boufounos,et al.  Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.

[24]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.

[25]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[26]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[27]  J M Lewin,et al.  Comparison of full-field digital mammography with screen-film mammography for cancer detection: results of 4,945 paired examinations. , 2001, Radiology.

[28]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[30]  Thierry Pun,et al.  Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..

[31]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[32]  Hao Wang,et al.  A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.

[33]  João Leitão,et al.  Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties , 2014, DPM/SETOP/QASA.

[34]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[35]  Min Wu,et al.  Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.

[36]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[37]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[38]  Liehuang Zhu,et al.  Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..

[39]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[40]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[41]  Kehua Guo,et al.  Combined retrieval: A convenient and precise approach for Internet image retrieval , 2016, Inf. Sci..

[42]  Soo-Chang Pei,et al.  Secure and robust SIFT , 2009, ACM Multimedia.

[43]  Zhihua Xia,et al.  Fingerprint liveness detection using gradient-based texture features , 2016, Signal, Image and Video Processing.

[44]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[45]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[46]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[47]  V VasilakosAthanasios,et al.  Security in cloud computing , 2015 .

[48]  B. S. Manjunath,et al.  Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..

[49]  Zhihua Xia,et al.  Attribute-based access control scheme with efficient revocation in cloud computing , 2016, China Communications.