Skip to main content

A Novel Content Based Image Retrieval Scheme in Cloud Computing

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11633))

Included in the following conference series:

Abstract

Image and multimedia data produced by individuals and enterprises is increasing in recent years. The need of outsourcing such intensive image feature detection tasks to cloud computing continues to grow. However, the concerns over the effective protection of private image and multimedia data when outsourcing it to cloud platform become the major barrier that impedes the further implementation of cloud computing techniques over massive amount of image and multimedia data. To address this challenge, a new scheme that supports Content Based Image Retrieval (CBIR) over the encrypted images without revealing the sensitive information to the cloud server is proposed. The novel scheme is based on complex networks theory and Speeded Up Robust Features (SURF) technique. SURF is one of the important local feature detection algorithms and has been broadly employed in different areas, including object recognition, image matching, robotic mapping, and so on. A high-performance privacy-preserving SURF feature detection system is analyzed and modeled for the secure computation purpose. The coordinates of the key-points (features) obtained from SURF detector are used to generate the complex network work. The security analysis and experiments show the security and efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yin, J., Lu, X., Chen, H., Zhao, X., Xiong, N.N.: System resource utilization analysis and prediction for cloud based applications under bursty workloads. Inf. Sci. 279, 338–357 (2014)

    Article  Google Scholar 

  2. Duncan, G., Mukherjee, S.: Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise. Publ. Am. Stat. Assoc. 95, 720–729 (2000)

    Article  Google Scholar 

  3. Cui, Q., Mcintosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Contin. 55, 229–241 (2018)

    Google Scholar 

  4. Zhou, S., Liang, W., Li, J., Kim, J.-U.: Improved VGG model for road traffic sign recognition. Comput. Mater. Contin. 57, 11–24 (2018)

    Article  Google Scholar 

  5. Hirata, K., Kato, T.: Query by visual example - content based image retrieval. In: Pirotte, A., Delobel, C., Gottlob, G. (eds.) Advances in Database Technology - EDBT 1992. LNCS, vol. 580, pp. 56–71. Springer, Heidelberg (1992). https://doi.org/10.1007/BFb0032418

    Chapter  Google Scholar 

  6. Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48–63 (2017)

    Article  Google Scholar 

  7. Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: Media Forensics and Security I, p. 725418 (2009)

    Google Scholar 

  8. Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533–1536 (2009)

    Google Scholar 

  9. Wang, Y., Miao, M., Shen, J., Wang, J.: Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput. 1–12 (2017)

    Google Scholar 

  10. Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91–110 (2004)

    Article  Google Scholar 

  11. Costa, L.d.F., Rodrigues, F.A., Travieso, G., Boas, P.R.V.: Characterization of complex networks: a survey of measurements. Adv. Phys. 56, 167–242 (2007)

    Google Scholar 

  12. Li, J., Wang, J.Z.: Real-time computerized annotation of pictures. IEEE Trans. Pattern Anal. Mach. Intell. 30, 985 (2008)

    Article  Google Scholar 

  13. Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.Q.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164–172 (2017)

    Article  Google Scholar 

  14. Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: SecSIFT: secure image SIFT feature extraction in cloud computing. ACM Trans. Multimed. Comput. Commun. Appl. 12, 65 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

This paper is one of the results of the 2016 Guangdong Provincial Higher Vocational Education Leading Talent Project (Hui Suo). This work is partly supported by the National Natural Science Foundation of China (NO. 51505191) and the Chinese Postdoctoral Science Foundation (NO. 2018M632229).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caijuan Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Z., Huang, C., Suo, H., Yang, B. (2019). A Novel Content Based Image Retrieval Scheme in Cloud Computing. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24265-7_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24264-0

  • Online ISBN: 978-3-030-24265-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics