Skip to main content

A Secure JPEG Image Retrieval Method in Cloud Environment

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Included in the following conference series:

  • 1983 Accesses

Abstract

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this lead to difficulties in image retrieval. A secure JPEG image retrieval method is proposed in this paper. Image is encrypted on DCT (Discrete Cosine Transform) domain by scrambling encryption, and the encrypted image is outsourced to the server, then the DC difference histogram and LBP (Local Binary Patterns) among the image blocks are extracted as image feature vectors by the server. Both the image confidentiality and retrieval accuracy are guaranteed in the proposed method with less computational complexity and communication cost. Experimental results prove that the proposed scheme has good encryption security and can achieve better retrieval performance.

Fund projects: the National Natural Science Foundation of China (41571426, 61232016), U1405254, PAPD fund, and LIESMARS Special Research Funding

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Smeulders, A.W.M., Worring, M., Santini, S., et al.: Content-based image retrieval at the end of the early years. Pattern Anal. Mach. Intell. IEEE Trans. 22(12), 1349–1380 (2000)

    Article  Google Scholar 

  2. Wu, M., Swaminathan, A., Varna, A.L., et al.: Secure image retrieval through feature protection. In: Proceedings of ICASSP, pp. 1533–1536 (2009)

    Google Scholar 

  3. Karthik, K., Kashyap, S.: Transparent hashing in the encrypted domain for privacy preserving image retrieval. Signal. Image Video Process. 7(4), 647–664 (2013)

    Article  Google Scholar 

  4. Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)

    Article  MathSciNet  Google Scholar 

  5. Yagisawa, M.: Fully Homomorphic Encryption without bootstrapping (2015). https://www.lap-publishing.com/

  6. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507–518 (2015)

    Article  Google Scholar 

  7. Lin, C.H., Chen, R.T., Chan, Y.K.: A smart content-based image retrieval system based on color and texture feature. Image Vis. Comput. 27(11), 658–665 (2009)

    Article  Google Scholar 

  8. Rane, S., Boufounos, P., Vetro, A.: Quantized embeddings: an efficient and universal nearest neighbor method for cloud-based image retrieval. Appl. Digit. Image Process. XXXVI 8856(3), 537 (2013)

    Google Scholar 

  9. Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.-L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Chen, C.C., Wen, C.H., Su, C.H.: Systems and methods for randomly accessing compressed images, US, US 8107754 B2 (2012)

    Google Scholar 

  11. Schaefer, G., Edmundson, D.: DC Stream Based JPEG Compressed Domain Image Retrieval, pp. 318–327. Springer, Heidelberg (2012)

    Google Scholar 

  12. Gao, Y., Zhang, B.: Sobel-LBP. In: Proceedings of ICIP, pp. 2144–2147 (2008)

    Google Scholar 

  13. Zheng, Y., Jeon, B., Danhua, X., Jonathan Wu, Q.M., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), 961–973 (2015)

    Google Scholar 

  14. Wang, J.: Study and Implement on Large-Scalable Face Image Fast Retrieval. University of Science and Technology of China (2014)

    Google Scholar 

  15. Bibin, D., Punitha, P.: Image classification using artificial neural networks: an experimental study on corel database. Int. J. Mach. Intell. 3(4), 225 (2011)

    Google Scholar 

  16. Yan, T.W., Garcia-Molina, H.: The SIFT information dissemination system. ACM Trans. Database Syst. 24(4), 529–565 (1999)

    Article  Google Scholar 

  17. Piwowarski, B., Dupret, G.: Evaluation in (XML) information retrieval: expected precision-recall with user modelling (EPRUM). In: Proceedings of ACM SIGIR, pp. 260–267 (2006)

    Google Scholar 

  18. Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security. Springer International Publishing, Cham (2014)

    Book  MATH  Google Scholar 

  19. Guan, L.N.: Research on Image Joint Compression - Encryption Algorithm based on SPIHT Coding. Hainan University (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanyan Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Han, W., Xu, Y., Gong, J. (2016). A Secure JPEG Image Retrieval Method in Cloud Environment. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics