Abstract
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this lead to difficulties in image retrieval. A secure JPEG image retrieval method is proposed in this paper. Image is encrypted on DCT (Discrete Cosine Transform) domain by scrambling encryption, and the encrypted image is outsourced to the server, then the DC difference histogram and LBP (Local Binary Patterns) among the image blocks are extracted as image feature vectors by the server. Both the image confidentiality and retrieval accuracy are guaranteed in the proposed method with less computational complexity and communication cost. Experimental results prove that the proposed scheme has good encryption security and can achieve better retrieval performance.
Fund projects: the National Natural Science Foundation of China (41571426, 61232016), U1405254, PAPD fund, and LIESMARS Special Research Funding
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Smeulders, A.W.M., Worring, M., Santini, S., et al.: Content-based image retrieval at the end of the early years. Pattern Anal. Mach. Intell. IEEE Trans. 22(12), 1349–1380 (2000)
Wu, M., Swaminathan, A., Varna, A.L., et al.: Secure image retrieval through feature protection. In: Proceedings of ICASSP, pp. 1533–1536 (2009)
Karthik, K., Kashyap, S.: Transparent hashing in the encrypted domain for privacy preserving image retrieval. Signal. Image Video Process. 7(4), 647–664 (2013)
Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)
Yagisawa, M.: Fully Homomorphic Encryption without bootstrapping (2015). https://www.lap-publishing.com/
Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)
Lin, C.H., Chen, R.T., Chan, Y.K.: A smart content-based image retrieval system based on color and texture feature. Image Vis. Comput. 27(11), 658–665 (2009)
Rane, S., Boufounos, P., Vetro, A.: Quantized embeddings: an efficient and universal nearest neighbor method for cloud-based image retrieval. Appl. Digit. Image Process. XXXVI 8856(3), 537 (2013)
Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.-L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)
Chen, C.C., Wen, C.H., Su, C.H.: Systems and methods for randomly accessing compressed images, US, US 8107754 B2 (2012)
Schaefer, G., Edmundson, D.: DC Stream Based JPEG Compressed Domain Image Retrieval, pp. 318–327. Springer, Heidelberg (2012)
Gao, Y., Zhang, B.: Sobel-LBP. In: Proceedings of ICIP, pp. 2144–2147 (2008)
Zheng, Y., Jeon, B., Danhua, X., Jonathan Wu, Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), 961–973 (2015)
Wang, J.: Study and Implement on Large-Scalable Face Image Fast Retrieval. University of Science and Technology of China (2014)
Bibin, D., Punitha, P.: Image classification using artificial neural networks: an experimental study on corel database. Int. J. Mach. Intell. 3(4), 225 (2011)
Yan, T.W., Garcia-Molina, H.: The SIFT information dissemination system. ACM Trans. Database Syst. 24(4), 529–565 (1999)
Piwowarski, B., Dupret, G.: Evaluation in (XML) information retrieval: expected precision-recall with user modelling (EPRUM). In: Proceedings of ACM SIGIR, pp. 260–267 (2006)
Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security. Springer International Publishing, Cham (2014)
Guan, L.N.: Research on Image Joint Compression - Encryption Algorithm based on SPIHT Coding. Hainan University (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Han, W., Xu, Y., Gong, J. (2016). A Secure JPEG Image Retrieval Method in Cloud Environment. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-48674-1_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48673-4
Online ISBN: 978-3-319-48674-1
eBook Packages: Computer ScienceComputer Science (R0)