Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications

Every day social multimedia applications generate millions of images. To handle such huge amount of images, an optimal solution is using the public cloud, since it has powerful storage capability. Images usually contain a wealth of sensitive information, therefore social service providers need not only to provide services such as retrieval and sharing but also to protect the privacies of the images. In this paper, we propose a privacy-preserving scheme for content-based image retrieval and sharing in social multimedia applications. First, the users extract visual features from the images, and perform locality-sensitive hashing functions on visual features to generate image profile vectors. We then model the retrieval on the images as the equality search on the image profile vectors. To enable accurate and efficient retrieval, we design the secure index structure based on cuckoo hashing, which has constant lookup time. To meet the requirements of dynamic image updating, we enrich our service with image insertion and deletion. In order to reduce the key management overhead and the access control overhead in social applications, we process keys using secret sharing techniques to enable the users holding similar images to query and decrypt images independently. Finally we implement the prototype of the proposed scheme, and perform experiments over encrypted image databases.

[1]  Yanjiao Chen,et al.  InstantCryptoGram: Secure Image Retrieval Service , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[2]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[3]  Zahid Mehmood,et al.  Scene analysis and search using local features and support vector machine for effective content-based image retrieval , 2018, Artificial Intelligence Review.

[4]  Dan Feng,et al.  A Collision-Mitigation Cuckoo Hashing Scheme for Large-Scale Storage Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[5]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[6]  Zhe Wang,et al.  Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.

[7]  Kazi Wasif Ahmed,et al.  Image-Centric Social Discovery Using Neural Network under Anonymity Constraint , 2017, 2017 IEEE International Conference on Cloud Engineering (IC2E).

[8]  Rasmus Pagh,et al.  Cuckoo Hashing , 2001, Encyclopedia of Algorithms.

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Yun Q. Shi,et al.  A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..

[11]  Heng Tao Shen,et al.  Hashing for Similarity Search: A Survey , 2014, ArXiv.

[12]  Bogdan Warinschi,et al.  Masking Fuzzy-Searchable Public Databases , 2019, IACR Cryptol. ePrint Arch..

[13]  Shucheng Yu,et al.  SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[14]  Qiang Tang,et al.  Data Is Key: Introducing the Data-Based Access Control Paradigm , 2009, DBSec.

[15]  Jian Shen,et al.  Towards efficient privacy-preserving encrypted image search in cloud computing , 2019, Soft Comput..

[16]  Zhe Wang,et al.  Modeling LSH for performance tuning , 2008, CIKM '08.

[17]  Nathan Chenette,et al.  Efficient Fuzzy Search on Encrypted Data , 2014, FSE.

[18]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[19]  Piotr Indyk,et al.  Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.

[20]  Gary R. Bradski,et al.  ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.

[21]  Cong Wang,et al.  Towards Privacy-Preserving and Practical Image-Centric Social Discovery , 2018, IEEE Transactions on Dependable and Secure Computing.

[22]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[23]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.