Abstract
With the rapid development of cloud computing and big data, it is an ever-increasing trend to outsource the huge amount of multimedia data to the cloud. Although data outsourcing can alleviate data maintenance cost of user side, it inevitably brings some new security challenges, of which privacy of image content is the most significant one. Thus, privacy-preserving image search becomes a new research interest in academic community. In this paper, we propose a novel efficient search scheme for encrypted image by incorporating K-means and secure modular hashing, which can simultaneously achieve privacy-preserving of image search and comparable search accuracy to plaintext image. Furthermore, we provide comprehensively security analysis on the proposed solution and detailed efficiency evaluation over some real-world datasets. The results show that our solution can achieve desired security goals while providing a comparable search efficiency and accuracy.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Agrawal, R, Kiernan, J, Srikant, R, Xu, Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574. ACM
Andoni, A, Indyk, P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 2006 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS’06., pp. 459–468
Boneh, D, Di Crescenzo, G, Ostrovsky, R, Persiano, G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506–522. Springer
Broder, A.Z, Charikar, M, Frieze, A.M, Mitzenmacher (1998) M Min-wise independent permutations. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 327–336. ACM
Chen P, Ye J, Chen X (2016) Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput 20(11):4589–4596
Cheng, B, Zhuo, L, Bai, Y, Peng, Y, Zhang, J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing (BdCloud), pp. 116–120. IEEE
Datar, M, Immorlica, N, Indyk, P, Mirrokni, V.S (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp. 253–262. ACM
Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics and Secur 12(8):1874–1884
Fu ZJ, Shu JG, Wang J, Liu YL, Lee SY (2015) Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. WHWgW 16(3):453–460
He, K, Wen, F, Sun, J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2938–2945
Hirata, K, Kato, T (1992) Query by visual example. In: international conference on extending database technology, pp. 56–71. Springer
Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607
Huang, K, Xu, M, Fu, S, Wang, D (2016) Efficient privacy-preserving content-based image retrieval in the cloud. In: International conference on web-age information management, pp. 28–39. Springer
Jégou, H, Douze, M, Schmid, C (2008) Hamming embedding and weak geometry consistency for large scale image search-extended version
Jiménez, A, Raj, B, Portelo, J, Trancoso, I (2015) Secure modular hashing. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp. 1–6. IEEE
Li, J, Li, J, Chen, X, Jia, C, Liu, Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: International conference on network and system security, pp. 490–502. Springer
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics and Secur 10(3):507–518
Li P, Li T, Yao ZA, Tang CM, Li J (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):1–11
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110
Lu, W, Swaminathan, A, Varna, A.L, Wu, M (2009) Enabling search over encrypted multimedia databases. In: Proceedings international society for optics and photonics IS&T/SPIE electronic imaging, pp. 725,418–725,418
Lu, W, Varna, A.L, Swaminathan, A, Wu, M (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009, pp. 1533–1536. IEEE
Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2:125–141
Shashank, J, Kowshik, P, Srinathan, K, Jawahar, C (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, 2008. CVPR 2008, pp. 1–8. IEEE
Shen, J, Shen, J, Chen, X, Huang, X, Susilo, W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics and Secur
Wang J, Miao M, Gao Y, Chen X (2016) Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput 20(11):4487–4495
Wong, W.K, Cheung, D.W.l, Kao, B, Mamoulis, N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139–152. ACM
Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distrib Syst 27(2):340–352
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics and Secur 11(11):2594–2608
Xia, Z, Zhu, Y, Sun, X, Qin, Z, Ren, K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. WHWgW 18(2):435–442
Yuan, J, Yu, S, Guo, L (2015) Seisa: Secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083–2091. IEEE
Zhang, L, Jung, T, Feng, P, Li, X.Y, Liu, Y (2014) Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593
Zhang, L, Jung, T, Liu, C, Ding, X, Li, X.Y, Liu, Y (2015) Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th international conference on distributed computing systems (ICDCS), pp. 308–317. IEEE
Zhang, Y, Zhuo, L, Peng, Y, Zhang, J (2014) A secure image retrieval method based on homomorphic encryption for cloud computing. In: 2014 19th international conference on digital signal processing (DSP), pp. 269–274. IEEE
Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics and Secur 12(1):48–63
Zou, Q, Wang, J, Ye, J, Shen, J, Chen, X (2016) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput, pp. 1–11
Acknowledgements
This study was funded by the National Natural Science Foundation of China (Nos. 61572382 and 61702401), China 111 Project (No. B16037), National Key Research and Development Program of China (No. 2017YFB0802202), National High Technology Research and Development Program (863 Program) of China (No. 2015AA01 6007), Key Project of Natural Science Basic Research Plan in Shannxi Province of China (No. 2016JZ021), China Postdoctoral Science Foundation (No. 2017M613083) and the CICAEET fund and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Wang, Y., Miao, M., Shen, J. et al. Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput 23, 2101–2112 (2019). https://doi.org/10.1007/s00500-017-2927-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-017-2927-6