Secure Image Retrieval Scheme in the Encrypted Domain

Pei Zhang, Li Zhuo, Yingdi Zhao, Bo Cheng, Jing Zhang, Xiaoqin Song

Abstract

Currently, the image retrieval methods focus on improving the retrieval performance, but ignoring preserving the problem of preserving privacy. Images contain a great deal of personal privacy information, and leakage of information will result in seriously negative effect. Ensuring the image retrieval performance while preserving the confidentiality of data has become the key issue in the field of image retrieval. Based on the Content-based Image Retrieval (CBIR), we propose a secure image retrieval scheme in the encrypted domain, where the encrypted features can be used in similarity comparison directly. This paper compares the ciphertext retrieval with plaintext retrieval to illustrate that the proposed scheme could achieve the comparable retrieval performance, while ensuring the image information security at the same time.

References

  1. Meng Wang, Kuiyuan Yang, Xian-Sheng Hua, HongJiang Zhang, 2010. Towards a Relevant and Diverse Search of Social Images. IEEE Transactions on Multimedia, vol. 12, no. 8, pp. 829-842.
  2. Gao, Y., Wang, M., Zha, Z. J., Shen, J. L., Li., X. L., Wu, X. D, 2012. Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search. IEEE Transactions on Image Processing. In press.
  3. M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, 2007. A Modified AES Based Algorithm for Image Encryption. International Journal of Computer Science and Engineering Volume1 Number1,pp. 70-75.
  4. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, 2007. Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP Journal on Information Security, vol. 7, no. 2, pp. 1-20.
  5. J. Eakins, M. Graham, 1999. Content-based image retrieval. Tech. Rep. JTAP-039, JISC Technology Application Program. Newcastle upon Tyne.
  6. W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, 2009. Enabling search over encrypted multimedia databases. Proc. of SPIE, vol. Media Forensics and Security.
  7. W. Lu, Varna, A. L., Swaminathan, A., and Wu, M., 2009. Secure image retrieval through feature protection. IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533-1536.
  8. Lin He, 2008. A Research of The User's Interest Used in Image retrieval. Signal and Information Processing Lab, Beijing University of Technology.
  9. M. Partio, B. Cramariuc, M. Gabbouj, and A. Visa, 2002. Rock texture retrieval using gray level co-occurrence matrix. In 5th Nordic signal processing symposium on board Hurtigruten. Norway.
  10. Ming-Kuei Hu, 1962. Visual pattern recognition by moment invariants. IEEE Transactions on Information Theory, vol. 8, no. 2, pp. 179-187.
Download


Paper Citation


in Harvard Style

Zhang P., Zhuo L., Zhao Y., Cheng B., Zhang J. and Song X. (2013). Secure Image Retrieval Scheme in the Encrypted Domain . In Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 1: VISAPP, (VISIGRAPP 2013) ISBN 978-989-8565-47-1, pages 783-787. DOI: 10.5220/0004289707830787


in Bibtex Style

@conference{visapp13,
author={Pei Zhang and Li Zhuo and Yingdi Zhao and Bo Cheng and Jing Zhang and Xiaoqin Song},
title={Secure Image Retrieval Scheme in the Encrypted Domain},
booktitle={Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 1: VISAPP, (VISIGRAPP 2013)},
year={2013},
pages={783-787},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004289707830787},
isbn={978-989-8565-47-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Computer Vision Theory and Applications - Volume 1: VISAPP, (VISIGRAPP 2013)
TI - Secure Image Retrieval Scheme in the Encrypted Domain
SN - 978-989-8565-47-1
AU - Zhang P.
AU - Zhuo L.
AU - Zhao Y.
AU - Cheng B.
AU - Zhang J.
AU - Song X.
PY - 2013
SP - 783
EP - 787
DO - 10.5220/0004289707830787