Abstract
In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable image encryption algorithm based on Block Truncation Coding (BTC) and Henon chaotic map is presented. Henon Chaotic map is used to encrypt two quantization levels of BTC compressed images, and a pseudo random sequence is created by chaotic map to scramble the bit plane of each sub-block. The feature value of each sub-block is computed according to the relationship between the number of 1s and 0s in the corresponding bit plane. The encrypted image retrieval can be achieved by comparing the normalized correlation coefficients between the feature vectors. Experimental results show that the proposed scheme has satisfactory retrieval accuracy and security. Meanwhile, it has low computational cost and can be used for encrypted images retrieval in the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Poh, G.S., Chin, J.J., Yau, W.C., Choo, K.K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. 50(3), 1–37 (2017)
Yuan, J., Yu, S., Guo, L.: SEISA: secure and efficient encrypted image search with access control. In: Jiannong, C., Jie, W. (eds.) 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083–2091. IEEE, New York (2015)
Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)
Xia, Z., Zhu, Y., Sun, X., et al.: A similarity search scheme over encrypted cloud images based on secure transformation. Int. J. Future Gener. Commun. Netw. 6(6), 71–80 (2013)
Zhu, Y., Sun, X., Xia, Z., et al.: Enabling similarity search over encrypted images in cloud. Inf. Technol. J. 3(5), 824–831 (2014)
Zhu, Y., Sun, X., Xia, Z., et al.: Secure similarity search over encrypted cloud images. Int. J. Secur. Appl. 9(8), 1–14 (2015)
Zou, Q., Wang, J., Ye, J., et al.: Efficient and secure encrypted image search in mobile cloud computing. Soft. Comput. 21(11), 2959–2969 (2017)
Hyma, J., Kumar, D.S.S., Anand, A., et al.: An efficient privacy preserving medical image retrieval using ROI enabled searchable encryption. Int. J. Appl. Eng. Res. 11(11), 7509–7516 (2016)
Wang, Y., Miao, M., Shen, J., et al.: Towards efficient privacy-preserving encrypted image search in cloud computing. Soft. Comput. 7(11), 1–12 (2017)
Kamal, A.A.A.M., Iwamura, K., Kang, H.: Searchable encryption of image based on secret sharing scheme. In: Furui, S., Liu, R., et al. (eds.) 2017 Asia-Pacific Signal and Information Processing Association Summit and Conference, pp. 1495–1503. APSIPA, Hawaii (2017)
Zhang, C., Li, J., Wang, S., et al.: An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain. In: 2017 International Conference on Software Engineering Research, Management and Applications, pp. 135–141. ACM, New York (2017)
Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)
Lema, M., Mitchell, O.R.: Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 32(10), 1148–1157 (1984)
Acknowledgements
This work was supported in part by the National Social Science Fund of China under Grant No. 17BTQ084, the Social Science Fund of Hunan Province under Grant No. 16YBA102, and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No. 2015TP1017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Jiang, M., Sun, G. (2018). A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)