LSB Elimination based Feature Extraction for Outsourced Image Retrieval in Encrypted Images

This paper proposes an image retrieval approach in encrypted images that are outsourced to the cloud network using LSB (Least significant bit) elimination based feature extraction. To preserve the privacy of the image that is outsourced to the cloud, the images are encrypted. Retrieving the encrypted images that are outsourced to cloud is considered as a challenging task. The proposed method eliminates the LS B’ $s$, and the histogram is estimated to obtain the necessary features. Initially, the image owner encrypts the original image by using a key and uploads the encrypted image to the cloud. The cloud server extracts the features from the encrypted original image and stores the features in the cloud. To perform image retrieval, the user has to encrypt the Query image using a key, and it must be uploaded to the cloud. The cloud server extracts the features from the Query image and matches with the features that are already stored in the cloud server. The encrypted images correspond to the top-k matched features are returned to the user, from which the user has to decrypt it using the key. The performance of the proposed method was measured in terms of Precision, time of feature extraction, time of index construction and time of image retrieval. Experimental results reveal that the proposed feature extraction outperforms than the traditional methods.

[1]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[2]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Tania Oost,et al.  Lest we remember , 2002 .

[4]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[5]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[6]  João Leitão,et al.  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.

[7]  Sharath Pankanti,et al.  Fingerprint verification using SIFT features , 2008, SPIE Defense + Commercial Sensing.

[8]  Debnath Bhattacharyya,et al.  Secure delivery of handwritten signature , 2006, UBIQ.

[9]  Gwénolé Quellec,et al.  Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[10]  Xinpeng Zhang,et al.  Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[11]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..

[13]  Howard Williams,et al.  Lest we remember , 2001 .

[14]  Thomas Schneider,et al.  Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.

[15]  Vitomir Struc,et al.  Adaptation of SIFT Features for Robust Face Recognition , 2010, ICIAR.

[16]  Chenggang Clarence Yan,et al.  Triple-Bit Quantization with Asymmetric Distance for Image Content Security , 2017, Machine Vision and Applications.

[17]  Jie Tian,et al.  Text Clustering on National Vulnerability Database , 2010, 2010 Second International Conference on Computer Engineering and Applications.

[18]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Peng Changgen,et al.  Certificateless public key encryption with keyword search , 2014, China Communications.