Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Papers|更新时间:2024-06-05
|
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Journal on CommunicationsVol. 40, Issue 2, Pages: 31-39(2019)
作者机构:
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 陕西省网络与系统安全重点实验室,陕西 西安 710071
作者简介:
基金信息:
The National Natural Science Foundation of China(U1405255);The Shaanxi Science & Technology Coordination & Innovation Project(2016TZC-G-6-3);The National Natural Science Foundation of China(61702404)
The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead
but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems
an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile
the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process
and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.
关键词
Keywords
references
FISCHER B , BROSIG A , DESERNO T M , et al . Structural scene analysis and content-based image retrieval applied to bone age assessment [C ] // Proc Society of Photo-Optical Instrumentation Engineers Conference Series . 2009 , 7260 : 726004 - 726011 .
MISHRA N , SILAKARI S . Image Mining in the Context of Content Based Image Retrieval:A Perspective [J ] . International Journal of Computer Science Issues , 2012 , 9 ( 4 ): 121 - 132 .
BO C , SHEN G , LIU J , et al . Privacy.tag:privacy concern expressed and respected [C ] // Proc.ACM International Conference on Embedded Networked Sensor Systems (SenSys’14) . 2014 : 163 - 176 .
SHASHANK J , KOWSHIK P , SRINATHAN K , et al . Private Content Based Image Retrieval [C ] // IEEE Conference on Computer Vision and Pattern Recognition (CVPR’14) . 2014 : 1 - 8 .
LU W , SWAMINATHAN A , Varna A L , et al . Enabling search over encrypted multimedia databases [C ] // Media Forensics and Security I . 2009 :725418.
PERRONNIN F , LIU Y , SANCHEZ J , et al . Large-scale image retrieval with compressed Fisher vectors [C ] // Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR’10) . 2010 : 3384 - 3391 .
DOUZE M , RAMISA A , SCHMID C . Combining attributes and Fisher vectors for efficient image retrieval [C ] // Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR'11) . 2011 : 745 - 752 .
HSU C Y , LU C S , PEI S C . Secure and robust SIFT [C ] // Proc.ACM International Conference on Multimedia (MM’09) . 2009 : 637 - 640 .
ZHANG Y , SUN X , WANG B . Efficient algorithm for k-barrier coverage based on integer linear programming [J ] . China Communications , 2016 , 13 ( 7 ): 16 - 23 .
ZHENG P , HUANG J . An efficient image homomorphic encryption scheme with small ciphertext expansion [C ] // ACM International Conference on Multimedia . 2013 , 24 ( 3 ): 803 - 812 .
XIA Z , XIONG N N , VASILAKOS A V , et al . EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing [J ] . Information Sciences , 2017 , 387 : 195 - 204 .
WONG W K , CHEUNG D W , KAO B , et al . Secure kNN computation on encrypted databases [C ] // International Conference on Management of Data . 2009 : 139 - 152 .
YUAN J , YU S , GUO L . SEISA:Secure and efficient encrypted image search with access control [C ] // IEEE Conference on Computer Communications . 2015 : 2083 - 2091 .
ZHANG L , JUNG T , FENG P , et al . PIC:enable large-scale privacy preserving content-based image search on cloud [C ] // International Conference on Parallel Processing . 2015 : 949 - 958 .
JEGOU H , DOUZE M , SCHMID C . Hamming embedding and weak geometric consistency for large scale image search [C ] // Proc European Conference on Computer Vision . 2008 : 304 - 317 .
REGEV O . On lattices,learning with errors,random linear codes,and cryptography [J ] . Journal of the ACM , 2009 , 56 ( 6 ): 1 - 40 .
XIAO X , LI F , YAO B . Secure nearest neighbor revisited [C ] // Proc.IEEE International Conference on Data Engineering . 2013 : 733 - 744 .
YUE Y , FINLEY T , RADLINSKI F , et al . A support vector method for optimizing average precision [C ] // Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’07) . 2007 : 271 - 278 .