Abstract
Advances in computer vision technologies lead to a renewed focus on content-based image retrieval (CBIR) in computer multimedia content analysis applications. CBIR is a technique for image retrieval using automatically derived features. As the size of image repositories grew, supported by increased cloud storage adoption, security concern around trust in cloud service provider (CSP) witnessed a resurgence of interest in user privacy. Hence, unlike in traditional CBIR, cloud-based image retrieval is based on the encrypted feature vector. This may reduce the overall retrieval performance of the system. Consequently, mechanisms are needed to protect the feature vector and the actual images during transmission. Second, to provide image content security, images are often encrypted by users before uploading to the cloud. This article addresses the challenges of retrieving images securely from an untrusted cloud environment. Images are represented in terms of their local invariant features to form an image feature vector. Later, an asymmetric scalar-product-preserving encryption (ASPE) is applied to secure the feature vector. Then, images are encrypted before they are uploaded to a cloud server. The proposed method has been tested on various Corel image datasets and the medical image repository. Performance evaluation shows that the proposed method outperforms its best secure CBIR systems in the literature.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig16_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig17_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig18_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig19_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig20_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig21_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00521-021-06054-y/MediaObjects/521_2021_6054_Fig22_HTML.png)
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
53 incredible facebook statistics and facts. https://www.brandwatch.com/blog/facebook-statistics/#:~:text=Facebook%20generates%204%20new%20petabytes,have%20been%20uploaded%20to%20Facebook. Accessed on 27 Dec 2020
Belguith S, Kaaniche N, Hammoudeh M, Dargahi T (2020) Proud: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IOT applications. Fut Gener Comput Syst 111:899–918
Kumar S, Pradhan J, Pal AK (2017) A CBIR scheme using GLCM features in DCT domain. In: Proceedings of the 2017 IEEE international conference on computational intelligence and computing research
Kumar S, Pradhan J, Pal AK (2018) A CBIR technique based on the combination of shape and color features. Adv Comput Commun Parad 706:737–744
Huang J, Kumar SR, Mitra M, Zhu W-J, Zabih R (1997) Image indexing using color correlograms. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition, pp 762–768. IEEE
Pradhan J, Ajad A, Pal AK, Banka H (2019) Multi-level colored directional motif histograms for content-based image retrieval. Vis Comput 36:1–22
Zhang D, Guojun L (2004) Review of shape representation and description techniques. Pattern Recogn 37(1):1–19
Khotanzad A, Lu J-H (1990) Classification of invariant image representations using a neural network. IEEE Trans Acoust Speech Signal Process 38(6):1028–1038
Hammoudeh M, Newman R, Dennett C, Mount S (2013) Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wirel Commun Mob Comput 13(9):809–827
Hammoudeh M, Newman R (2015) Information extraction from sensor networks using the watershed transform algorithm. Inform Fusion 22:39–49
Majhi M, Pal AK, Pradhan J, Islam SKH, Khan MK (2021) Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multimed Tools Appl 1–33
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55. IEEE
Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Int Conf Appl Cryptogr Netw Sec 3531:442–455
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Sec 19(5):895–934
Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: Proceedings of the 2008 IEEE conference on computer vision and pattern recognition, pp 1–8. IEE
Lu W, Swaminathan A, Varna AL, Wu M (2009) Enabling search over encrypted multimedia databases. Int Soc Opt Photon Media Forens Sec 7254:725418
Yuan J, Yu S, Guo L (2015) Seisa: secure and efficient encrypted image search with access control. In: Proceedings of the 2015 IEEE conference on computer communications (INFOCOM), pp 2083–2091. IEEE
Xia Z, Xiong NN, Vasilakos AV, Sun X (2017) Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204
Shen M, Cheng G, Zhu L, Xiaojiang D, Jiankun H (2020) Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Fut Gener Comput Syst 109:621–632
Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 6(1):276–286
Yuan X, Wang X, Wang C, Squicciarini AC, Ren K (2016) Towards privacy-preserving and practical image-centric social discovery. IEEE Trans Depend Sec Comput 15(5):868–882
Bellafqira R, Coatrieux G, Bouslimi D, Quellec G (2015) Content-based image retrieval in homomorphic encryption domain. In: Proceeding of the 2015 37th annual international conference of the ieee engineering in medicine and biology society (EMBC), pp 2944–2947. IEEE
Weng L, Amsaleg L, Morton A, Marchand-Maillet S (2014) A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans Inf Forens Sec 10(1):152–167
Zhou J, Cao Z, Dong X, Lin X (2015) Ppdm: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344
Shengshan H, Wang Q, Wang J, Qin Z, Ren K (2016) Securing sift: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans Image Process 25(7):3411–3425
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forens Sec 11(11):2594–2608
Steiner M, Tsudik G, Waidner M (1996) Diffie-hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security, pp 31–37
William Rowan Hamilton (1866) Elements of quaternions. Green, & Company, Longmans
Ell TA, Sangwine SJ (2006) Hypercomplex fourier transforms of color images. IEEE Trans Image Process 16(1):22–35
Hosny KM, Darwish MM (2019) Feature extraction of color images using quaternion moments. Recent Adv Comput Vis 804:141–167
Mukundan R, Ong SH, Lee PA (2001) Image analysis by tchebichef moments. IEEE Trans Image Process 10(9):1357–1364
Pradhan J, Kumar S, Pal AK, Banka H (2018) Texture and color visual features based CBIR using 2D DT-CWT and histograms. Int Conf Math Comput 834:84–96
Feldman M (2011) Hilbert transform in vibration analysis. Mech Syst Signal Process 25(3):735–802
Lin J (1991) Divergence measures based on the shannon entropy. IEEE Trans Inf Theory 37(1):145–151
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801
Li J, Wang JZ (2008) Real-time computerized annotation of pictures. IEEE Trans Pattern Anal Mach Intell 30(6):985–1002
Yanyan X, Zhao X, Gong J (2019) A large-scale secure image retrieval method in cloud environment. IEEE Access 7:160082–160090
Yanyan X, Gong J, Xiong L, Zhengquan X, Wang J, Shi Y (2017) A privacy-preserving content-based image retrieval method in cloud environment. J Vis Commun Image Represent 43:164–172
Majhi M, Pal AK, Islam SKH, Khurram KM (2021) Secure content-based image retrieval using modified Euclidean distance for encrypted features. Trans Emerg Telecommun Technol 32(2):e4013
Kundu MK, Chowdhury M, Bulo SR (2015) A graph-based relevance feedback mechanism in content-based image retrieval. Knowl Based Syst 73:254–264
Chandra B, Varghese PP (2008) Fuzzy sliq decision tree algorithm. IEEE Trans Syst Man Cybern B (Cybern) 38(5):1294–1301
Barjinder K, Dinesh S, Partha PR (2019) Age and gender classification using brain–computer interface. Neural Comput Appl 31(10):5887–5900
Aslahi-Shahri BM, Rahmani R, Chizari M, Maralani A, Eslami M, Golkar MJ, Ebrahimi A (2016) A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl 27(6):1669–1676
Bahrammirzaee A (2010) A comparative survey of artificial intelligence applications in finance: artificial neural networks, expert system and hybrid intelligent systems. Neural Comput Appl 19(8):1165–1195
Nene Sameer A, Nayar Shree K, Murase H, et al (1996) Columbia object image library (coil-100)
Produce-1400 Database. http://www.ic.unicamp.br/~rocha/pub/downloads/tropical-fruits-DB-1024x768.tar.gz/. Accessed: 2018-04-07
Acknowledgements
The author Mr. Sumit Kumar (Admission No: 2015DR0056) is supported by the institute Ph.D. scholarship, IIT[ISM], Dhanbad, Jharkhand, India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, S., Pal, A.K., Islam, S. et al. Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput & Applic 35, 4855–4880 (2023). https://doi.org/10.1007/s00521-021-06054-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06054-y