skip to main content
10.1145/3386164.3389099acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiscsicConference Proceedingsconference-collections
research-article

A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment

Published: 06 June 2020 Publication History

Abstract

Cloud computing platform has powerful computing capacity and nearly infinite resource pool, which provides a strong guarantee for mass data storage and computing. Considering double security threats from malicious external attackers and "honest-but-curious" CSP (cloud service provider), users need to encrypt images to ensure the data security before outsourcing images to cloud. But encryption can have an impact on the necessary data services, such as content based image retrieval (CBIR). A secure CBIR method based on BoVW (Bag of Visual Words) model under cloud environment is proposed in the paper. Images are expressed as frequency histogram by BoVW model, orthogonal decomposition is utilized to divide it into two individual parts of component coefficients thus encryption operation and feature extraction operation can be executed separately, and orthogonal composition is used to fuse the encrypted operation results to construct secure image index. After encrypted image index and encrypted images are outsourced to CSP, distance comparison can be executed by CSP on feature extraction field without violating data privacy. Encrypted images with the closest distance to query trapdoor are returned to users to decrypt and obtain plain images. Any encryption algorithms can be used to encrypt images and search index by using orthogonal transformation, so that the proposed method is practicable. Retrieval precision is improved and better performance are achieved by using BoVW model. The security analysis and experimental results show our scheme has obvious advantages in security and retrieval performance.

References

[1]
A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L. Varna, S. He, et al. Confidentiality preserving rank-ordered search, in: Proceedings of ACM Workshop Storage, Security, and Survivability, 2007, pp. 7--12.
[2]
C. Hsu, C. Lu, S. Pei, Image feature extraction in encrypted domain with privacy-preserving SIFT, IEEE Trans. Image Process. 21 (11) (2012) 4593--4607.
[3]
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS) 2010, pp. 253--262.
[4]
D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano. Public-key encryption with keyword search, in: Advances in Cryptology - EUROCRYPT 2004. Springer, Berlin, Heidelberg, 2004, pp. 506--522.
[5]
D. Song, D. Wagner, A. Perrig, Practical techniques for searches in encrypted data, in: Proceedings of the IEEE Symposium on Research Security and Privacy, 2000, pp. 44--55.
[6]
Erkin Z, Franz M, Guajardo J et al. 2009. Privacy-preserving face recognition. Privacy Enhancing Technologies, 235--253
[7]
Erkin Z, Piva A, Katzenbeisser S, et al. Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing [J]. Eurasip Journal on Information Security, 2007, 2007(1):17.
[8]
Feifei L, Fergus R, Perona P. Learning Generative Visual Models from Few Training Examples: An Incremental Bayesian Approach Tested on 101 Object Categories[J]. Computer Vision & Image Understanding, 2005, 106(1):59--70.
[9]
Ferreira B, Rodrigues J, Leitao J, et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories[J]. IEEE Transactions on Cloud Computing, 2017, PP(99):1--1.
[10]
H. Jegou, M. Douze, C. Schmid, Hamming embedding and weak geometric consistency for large scale image search, in: Computer Vision-ECCV, Springer, 2008, pp. 304--317.
[11]
L. Ferretti, F. Pierazzi, M. Colajanni, M. Marchetti. Security and confidentiality solutions for public cloud database services, in: The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013.
[12]
Lowe D G. Lowe, D.G.: Distinctive Image Features from Scale-Invariant Key-points. Int. J. Comput. Vision 60(2), 91-110[J]. International Journal of Computer Vision, 2004, 60(2).
[13]
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst. 25(1) (2014) 222--233.
[14]
P. Mell, T. Grance, Draft NIST Working Definition of Cloud Computing <http://csrc.nist.gov/groups/SNS/cloudcomputing/index.html>, June 2009 Kato T. Database architecture for content-based image retrieval [J]. Proceedings of SPIE - The International Society for Optical Engineering, 1992, 1662:112--123.
[15]
R. Huang, X. Gui, S. Yu, et al., Study of privacy-preserving framework for cloud storage, Comp. Sci. Inf. Syst. 8 (3) (2011) 801--819.
[16]
R.L. Lagendijk, Z. Erkin, M. Barni, Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation, Sig. Process. Magaz. IEEE 30 (1) (2013) 82--105.
[17]
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comp. Appl. 34 (1) (2011) 1--11.
[18]
Shashank J, Kowshik P, Srinathan K, et al. Private Content Based Image Retrieval[C], Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE, 2008:1--8.
[19]
Sivic J, Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]// IEEE International Conference on Computer Vision, 2003. Proceedings. IEEE Xplore, 2003:1470-1477 vol.2.
[20]
Sivic J, Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]// IEEE International Conference on Computer Vision, 2003. Proceedings. IEEE Xplore, 2003:1470-1477 vol.2.
[21]
W. Lu, A. Swaminathan, A.L. Varna, M. Wu. Enabling search over encrypted multimedia databases, in: IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, 2009, pp. 725418-725418-11.
[22]
W. Lu, A. Varna, M. Wu, Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance preserving randomization, IEEE Access 2 (2014) 125--141.
[23]
W. Lu, A.L. Varna, A. Swaminathan, M. Wu, Secure image retrieval through feature protection, in: Proceedings of the IEEE Conference on Acoustics, Speech Signal Processing, 2009, pp. 1533--1536.
[24]
Wang J Z, Li J, Wiederhold G. SIMPLIcity: semantics-sensitive integrated matching for picture libraries [J]. Pattern Analysis & Machine Intelligence IEEE Transactions on, 2001, 23(9):947--963.
[25]
Wengert C, Douze M. Bag-of-colors for improved image search[C]// ACM International Conference on Multimedia. ACM, 2011:1437--1440.
[26]
Xia Z, Wang X, Zhang L, et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing [J]. IEEE Transactions on Information Forensics & Security, 2017, 11(11):2594--2608.
[27]
Xu Y, Gong J, Xiong L, et al. A privacy-preserving content-based image retrieval method in cloud environment [J]. Journal of Visual Communication & Image Representation, 2017, 43(C):164--172.
[28]
Y. Zhang, Li. Zhuo, Y. Peng, J. Zhang, A secure image retrieval method based on homomorphic encryption for cloud computing, in: Proceedings of the 19th International Conference on Digital Signal Processing, IEEE, 2014, pp. 269--274.
[29]
Z. Xia, Y. Zhu, X. Sun, et al., Towards privacy-preserving content-based image retrieval in cloud computing, IEEE Trans. Cloud Comput. (2015) 1.
[30]
Zhao R, Grosky W I. Narrowing the semantic gap - improved text-based web document retrieval using visual features [J]. Multimedia IEEE Transactions on, 2002, 4(2):189--200.

Index Terms

  1. A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ISCSIC 2019: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control
    September 2019
    397 pages
    ISBN:9781450376617
    DOI:10.1145/3386164
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 June 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. BoVW
    2. CBIR
    3. Orthogonal transformation
    4. Privacy-preserving
    5. Security and privacy

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ISCSIC 2019

    Acceptance Rates

    ISCSIC 2019 Paper Acceptance Rate 77 of 152 submissions, 51%;
    Overall Acceptance Rate 192 of 401 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 37
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 06 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media