A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

With the increasing importance of images in people's daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In this paper, we propose a scheme that supports CBIR over encrypted images without leaking the sensitive information to the cloud server. First, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, we propose a watermark-based protocol to deter such illegal distributions. In our watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction. The security analysis and the experiments show the security and efficiency of the proposed scheme.

[1]  Chin-Laung Lei,et al.  An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.

[2]  João Leitão,et al.  Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).

[3]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Alessandro Piva,et al.  Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.

[5]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[6]  Kasper Bonne Rasmussen,et al.  dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation , 2014, NDSS 2014.

[7]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[8]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[10]  Stefan Katzenbeisser,et al.  Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.

[11]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[12]  Alessandro Piva,et al.  A Provably Secure Anonymous Buyer–Seller Watermarking Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[13]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[14]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[15]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[16]  Xinpeng Zhang,et al.  Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[17]  Hugo Krawczyk,et al.  Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.

[18]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[20]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[21]  Yi Mu,et al.  Secure Image Retrieval Based on Visual Content and Watermarking Protocol , 2011, Comput. J..

[22]  Peijia Zheng,et al.  An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.

[23]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[24]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[25]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[26]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[27]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[28]  Alessandro Piva,et al.  Secure Client-Side ST-DM Watermark Embedding , 2010, IEEE Transactions on Information Forensics and Security.

[29]  Yu Bai,et al.  Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.

[30]  Cong Wang,et al.  Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.

[31]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[32]  Zhihua Xia,et al.  Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.

[33]  Nasir D. Memon,et al.  Protocols for Watermark Verification , 2001, IEEE Multim..

[34]  Mauro Barni,et al.  Managing Copyright in Open Networks , 2002, IEEE Internet Comput..

[35]  Petros Boufounos,et al.  Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.

[36]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[37]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..

[38]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[39]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[40]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[41]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[42]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.

[43]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[44]  Soo-Chang Pei,et al.  Secure and robust SIFT , 2009, ACM Multimedia.

[45]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[46]  B. S. Manjunath,et al.  Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..

[47]  Alessandro Neri,et al.  A joint digital watermarking and encryption method , 2008, Electronic Imaging.

[48]  Thierry Pun,et al.  Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..

[49]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[50]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[51]  Stefan Katzenbeisser,et al.  A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[52]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.