浏览全部资源
扫码关注微信
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 陕西省网络与系统安全重点实验室,陕西 西安 710071
[ "王祥宇(1994- ),男,内蒙古巴彦淖尔人,西安电子科技大学博士生,主要研究方向为数据安全、云安全、大数据隐私保护。" ]
[ "马建峰(1963- ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统安全、移动与无线安全、系统可生存性和可信计算。" ]
[ "苗银宾(1988- ),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全。" ]
网络出版日期:2019-02,
纸质出版日期:2019-02-25
移动端阅览
王祥宇, 马建峰, 苗银宾. 高效隐私保护的多用户图像外包检索方案[J]. 通信学报, 2019,40(2):31-39.
Xiangyu WANG, Jianfeng MA, Yinbin MIAO. Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user[J]. Journal on communications, 2019, 40(2): 31-39.
王祥宇, 马建峰, 苗银宾. 高效隐私保护的多用户图像外包检索方案[J]. 通信学报, 2019,40(2):31-39. DOI: 10.11959/j.issn.1000-436x.2019023.
Xiangyu WANG, Jianfeng MA, Yinbin MIAO. Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user[J]. Journal on communications, 2019, 40(2): 31-39. DOI: 10.11959/j.issn.1000-436x.2019023.
传统的隐私保护的图像检索方案会带来较大的计算量和通信开销,且在多用户场景下无法保护图像特征向量和查询请求的隐私。为此,提出了多用户场景下高效隐私保护的基于内容的图像检索方案。该方案利用隐私保护的欧式距离比较技术对图像特征向量进行相似度排序并返回 top-k 结果。同时,设计的高效密钥转换协议允许每一个检索用户使用自身的私钥生成查询请求,并检索不同数据拥有者生成的加密图像。安全分析表明,图像检索过程中,用户个人隐私以及云端数据安全都可以得到保护,且基于实际数据集的性能分析表明提出的图像检索方案在实际应用中是高效可行的。
The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead
but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems
an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile
the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process
and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.
FISCHER B , BROSIG A , DESERNO T M , et al . Structural scene analysis and content-based image retrieval applied to bone age assessment [C ] // Proc Society of Photo-Optical Instrumentation Engineers Conference Series . 2009 , 7260 : 726004 - 726011 .
MISHRA N , SILAKARI S . Image Mining in the Context of Content Based Image Retrieval:A Perspective [J ] . International Journal of Computer Science Issues , 2012 , 9 ( 4 ): 121 - 132 .
BO C , SHEN G , LIU J , et al . Privacy.tag:privacy concern expressed and respected [C ] // Proc.ACM International Conference on Embedded Networked Sensor Systems (SenSys’14) . 2014 : 163 - 176 .
SHASHANK J , KOWSHIK P , SRINATHAN K , et al . Private Content Based Image Retrieval [C ] // IEEE Conference on Computer Vision and Pattern Recognition (CVPR’14) . 2014 : 1 - 8 .
LU W , SWAMINATHAN A , Varna A L , et al . Enabling search over encrypted multimedia databases [C ] // Media Forensics and Security I . 2009 :725418.
PERRONNIN F , LIU Y , SANCHEZ J , et al . Large-scale image retrieval with compressed Fisher vectors [C ] // Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR’10) . 2010 : 3384 - 3391 .
DOUZE M , RAMISA A , SCHMID C . Combining attributes and Fisher vectors for efficient image retrieval [C ] // Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR'11) . 2011 : 745 - 752 .
HSU C Y , LU C S , PEI S C . Secure and robust SIFT [C ] // Proc.ACM International Conference on Multimedia (MM’09) . 2009 : 637 - 640 .
ZHANG Y , SUN X , WANG B . Efficient algorithm for k-barrier coverage based on integer linear programming [J ] . China Communications , 2016 , 13 ( 7 ): 16 - 23 .
ZHENG P , HUANG J . An efficient image homomorphic encryption scheme with small ciphertext expansion [C ] // ACM International Conference on Multimedia . 2013 , 24 ( 3 ): 803 - 812 .
XIA Z , XIONG N N , VASILAKOS A V , et al . EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing [J ] . Information Sciences , 2017 , 387 : 195 - 204 .
WONG W K , CHEUNG D W , KAO B , et al . Secure kNN computation on encrypted databases [C ] // International Conference on Management of Data . 2009 : 139 - 152 .
YUAN J , YU S , GUO L . SEISA:Secure and efficient encrypted image search with access control [C ] // IEEE Conference on Computer Communications . 2015 : 2083 - 2091 .
ZHANG L , JUNG T , FENG P , et al . PIC:enable large-scale privacy preserving content-based image search on cloud [C ] // International Conference on Parallel Processing . 2015 : 949 - 958 .
JEGOU H , DOUZE M , SCHMID C . Hamming embedding and weak geometric consistency for large scale image search [C ] // Proc European Conference on Computer Vision . 2008 : 304 - 317 .
YUAN J , TIAN Y . Practical privacy-preserving mapreduce basedk-means clustering over large-scale dataset [J ] . IEEE Transactions on Cloud Computing , 2017 ,PP( 99 ): 1 - 1 .
REGEV O . On lattices,learning with errors,random linear codes,and cryptography [J ] . Journal of the ACM , 2009 , 56 ( 6 ): 1 - 40 .
XIAO X , LI F , YAO B . Secure nearest neighbor revisited [C ] // Proc.IEEE International Conference on Data Engineering . 2013 : 733 - 744 .
YUE Y , FINLEY T , RADLINSKI F , et al . A support vector method for optimizing average precision [C ] // Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’07) . 2007 : 271 - 278 .
0
浏览量
1248
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构