4.6 Article

Image Security Retrieval Based on Chaotic Algorithm and Deep Learning

期刊

IEEE ACCESS
卷 10, 期 -, 页码 67210-67218

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3185421

关键词

Encryption; Feature extraction; Security; Image retrieval; Deep learning; Convolutional neural networks; Visualization; Image retrieval; security; deep artificial neural network; image encryption

资金

  1. Top Discipline Construction (Pedagogy), Foundation of Colleges and Universities of Ningxia, China [NXYLXK2017B11]

向作者/读者索取更多资源

This study proposes an image retrieval method based on deep learning, which achieves secure retrieval of ciphertext images through a deep artificial neural network model and an image encryption algorithm. Experimental results show significant improvements in retrieval efficiency and performance indicators, highlighting the importance of research on image information security retrieval.
At present, most image retrieval methods are based on plain-text images which poses a threat to some professional fields, such as medicine, military, and finance. In order to achieve greater security for the network transmission security of the image, we establish a deep artificial neural network model to extract features by sample training. Then an image-encryption algorithm that matches and secures image retrieval is designed and integrated into an image-retrieval process based on deep learning. Experiments on multiple authoritative datasets show that the proposed algorithm can not only achieve secure retrieval of ciphertext images, but also improve retrieval efficiency obviously. Specifically, the experimental results on five data sets show that compared with the average performance of 16 comparison algorithms, each evaluation indicator has been significantly improved in our research, with Pre increased by 12.54% - 88.20%, Rec increased by 1.46% - 10.95%, F1 increased by 2.86% - 13.55% and mAP increased by 16.64% - 82.47%. Futhermore, the successful realization of the ciphertext retrieval provides some reference for the information security retrieval research.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据