Skip to main content

Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties

  • Conference paper
  • First Online:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM 2014, QASA 2014, SETOP 2014)

Abstract

In this paper we introduce a new secure cryptographic scheme, named IES-CBIR, specifically designed for images and their outsourced storage and retrieval in large private image repositories. Our solution enables both encrypted storage and querying using Content Based Image Retrieval (CBIR), while preserving privacy. We have implemented a prototype system around the proposed scheme, and experimentally analyzed its performance when compared to similar proposals for privacy-preserving image retrieval. Our results show that IES-CBIR allows more efficient operations than existing proposals, both in terms of time and space overheads, while enabling less restrictive application scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Global Web Index: Instagram tops the list of social network growth (2013). http://blog.globalwebindex.net/instagram-tops-list-of-growth

  2. Rushe, D.: Google: don’t expect privacy when sending to Gmail. The Guardian (2013). http://tinyurl.com/kjga34x

  3. Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. The Guardian (2013). http://tinyurl.com/oea3g8t

  4. Chen, A.: GCreep: Google Engineer Stalked Teens, Spied on Chats. Gawker (2010). http://gawker.com/5637234

  5. Halderman, J., Schoen, S.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)

    Article  Google Scholar 

  6. Mahajan, P., et al.: Depot: cloud storage with minimal trust. ACM Trans. Comput. Syst. 29(4), 1–38 (2011)

    Article  Google Scholar 

  7. Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850–867. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Hsu, C.Y., et al.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)

    Article  MathSciNet  Google Scholar 

  9. Lu, W., et al.: Enabling search over encrypted multimedia databases. In: IS&T/SPIE Electron. Imaging, ISOP, February 2009. 725418–725418-11

    Google Scholar 

  10. Song, D.X., et al.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44–55. IEEE (2000)

    Google Scholar 

  11. Agrawal, R., et al.: Order preserving encryption for numeric data. In: Proceedings SIGMOD, pp. 563–574. ACM (2004)

    Google Scholar 

  12. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  13. El Gamal, Taher: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, David (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Swain, M.J., Ballard, D.H.: Color indexing. Int. J. Comput. Vis. 7(1), 11–32 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernardo Ferreira .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ferreira, B., Rodrigues, J., Leitão, J., Domingos, H. (2015). Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties. In: Garcia-Alfaro, J., et al. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. DPM QASA SETOP 2014 2014 2014. Lecture Notes in Computer Science(), vol 8872. Springer, Cham. https://doi.org/10.1007/978-3-319-17016-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17016-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17015-2

  • Online ISBN: 978-3-319-17016-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics