4.7 Article

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2016.2590944

Keywords

Searchable encryption; content-based image retrieval; secure kNN; copy deterrence; watermark

Funding

  1. National Natural Science Foundation of China [61173141, U1536206, 61232016, U1405254, 61373133, 61502242, 61572258, BK20150925]
  2. Fund of Jiangsu Engineering Center of Network Monitoring [KJR1402]
  3. Fund of Ministry of Education Internet Innovation Platform [KJRP1403]
  4. Collaborative Innovation Center of Atmospheric Environment and Equipment Technology
  5. Priority Academic Program Development Fund
  6. U.S. National Science Foundation [CNS-1262277]
  7. Jiangsu Government [JS-2014-332]
  8. National Science Foundation
  9. Department of Energy
  10. Air Force Research Laboratory
  11. MSR
  12. Amazon

Ask authors/readers for more resources

With the increasing importance of images in people's daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In this paper, we propose a scheme that supports CBIR over encrypted images without leaking the sensitive information to the cloud server. First, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, we propose a watermark-based protocol to deter such illegal distributions. In our watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction. The security analysis and the experiments show the security and efficiency of the proposed scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available