Skip to main content

A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

Abstract

In order to provide secure retrieval for encrypted digital images in cloud-based system, a secure searchable image encryption algorithm based on Block Truncation Coding (BTC) and Henon chaotic map is presented. Henon Chaotic map is used to encrypt two quantization levels of BTC compressed images, and a pseudo random sequence is created by chaotic map to scramble the bit plane of each sub-block. The feature value of each sub-block is computed according to the relationship between the number of 1s and 0s in the corresponding bit plane. The encrypted image retrieval can be achieved by comparing the normalized correlation coefficients between the feature vectors. Experimental results show that the proposed scheme has satisfactory retrieval accuracy and security. Meanwhile, it has low computational cost and can be used for encrypted images retrieval in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Poh, G.S., Chin, J.J., Yau, W.C., Choo, K.K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. 50(3), 1–37 (2017)

    Article  Google Scholar 

  2. Yuan, J., Yu, S., Guo, L.: SEISA: secure and efficient encrypted image search with access control. In: Jiannong, C., Jie, W. (eds.) 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083–2091. IEEE, New York (2015)

    Google Scholar 

  3. Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)

    Article  Google Scholar 

  4. Xia, Z., Zhu, Y., Sun, X., et al.: A similarity search scheme over encrypted cloud images based on secure transformation. Int. J. Future Gener. Commun. Netw. 6(6), 71–80 (2013)

    Article  Google Scholar 

  5. Zhu, Y., Sun, X., Xia, Z., et al.: Enabling similarity search over encrypted images in cloud. Inf. Technol. J. 3(5), 824–831 (2014)

    Google Scholar 

  6. Zhu, Y., Sun, X., Xia, Z., et al.: Secure similarity search over encrypted cloud images. Int. J. Secur. Appl. 9(8), 1–14 (2015)

    Google Scholar 

  7. Zou, Q., Wang, J., Ye, J., et al.: Efficient and secure encrypted image search in mobile cloud computing. Soft. Comput. 21(11), 2959–2969 (2017)

    Article  Google Scholar 

  8. Hyma, J., Kumar, D.S.S., Anand, A., et al.: An efficient privacy preserving medical image retrieval using ROI enabled searchable encryption. Int. J. Appl. Eng. Res. 11(11), 7509–7516 (2016)

    Google Scholar 

  9. Wang, Y., Miao, M., Shen, J., et al.: Towards efficient privacy-preserving encrypted image search in cloud computing. Soft. Comput. 7(11), 1–12 (2017)

    Google Scholar 

  10. Kamal, A.A.A.M., Iwamura, K., Kang, H.: Searchable encryption of image based on secret sharing scheme. In: Furui, S., Liu, R., et al. (eds.) 2017 Asia-Pacific Signal and Information Processing Association Summit and Conference, pp. 1495–1503. APSIPA, Hawaii (2017)

    Google Scholar 

  11. Zhang, C., Li, J., Wang, S., et al.: An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain. In: 2017 International Conference on Software Engineering Research, Management and Applications, pp. 135–141. ACM, New York (2017)

    Google Scholar 

  12. Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)

    Article  Google Scholar 

  13. Lema, M., Mitchell, O.R.: Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 32(10), 1148–1157 (1984)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Social Science Fund of China under Grant No. 17BTQ084, the Social Science Fund of Hunan Province under Grant No. 16YBA102, and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No. 2015TP1017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guang Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jiang, M., Sun, G. (2018). A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics