Skip to main content
Log in

Secure and efficient image retrieval through invariant features selection in insecure cloud environments

  • S.I. : Machine Learning Applications for Security
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Advances in computer vision technologies lead to a renewed focus on content-based image retrieval (CBIR) in computer multimedia content analysis applications. CBIR is a technique for image retrieval using automatically derived features. As the size of image repositories grew, supported by increased cloud storage adoption, security concern around trust in cloud service provider (CSP) witnessed a resurgence of interest in user privacy. Hence, unlike in traditional CBIR, cloud-based image retrieval is based on the encrypted feature vector. This may reduce the overall retrieval performance of the system. Consequently, mechanisms are needed to protect the feature vector and the actual images during transmission. Second, to provide image content security, images are often encrypted by users before uploading to the cloud. This article addresses the challenges of retrieving images securely from an untrusted cloud environment. Images are represented in terms of their local invariant features to form an image feature vector. Later, an asymmetric scalar-product-preserving encryption (ASPE) is applied to secure the feature vector. Then, images are encrypted before they are uploaded to a cloud server. The proposed method has been tested on various Corel image datasets and the medical image repository. Performance evaluation shows that the proposed method outperforms its best secure CBIR systems in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. 53 incredible facebook statistics and facts. https://www.brandwatch.com/blog/facebook-statistics/#:~:text=Facebook%20generates%204%20new%20petabytes,have%20been%20uploaded%20to%20Facebook. Accessed on 27 Dec 2020

  2. Belguith S, Kaaniche N, Hammoudeh M, Dargahi T (2020) Proud: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IOT applications. Fut Gener Comput Syst 111:899–918

    Article  Google Scholar 

  3. Kumar S, Pradhan J, Pal AK (2017) A CBIR scheme using GLCM features in DCT domain. In: Proceedings of the 2017 IEEE international conference on computational intelligence and computing research

  4. Kumar S, Pradhan J, Pal AK (2018) A CBIR technique based on the combination of shape and color features. Adv Comput Commun Parad 706:737–744

    Article  Google Scholar 

  5. Huang J, Kumar SR, Mitra M, Zhu W-J, Zabih R (1997) Image indexing using color correlograms. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition, pp 762–768. IEEE

  6. Pradhan J, Ajad A, Pal AK, Banka H (2019) Multi-level colored directional motif histograms for content-based image retrieval. Vis Comput 36:1–22

    Google Scholar 

  7. Zhang D, Guojun L (2004) Review of shape representation and description techniques. Pattern Recogn 37(1):1–19

    Article  Google Scholar 

  8. Khotanzad A, Lu J-H (1990) Classification of invariant image representations using a neural network. IEEE Trans Acoust Speech Signal Process 38(6):1028–1038

    Article  Google Scholar 

  9. Hammoudeh M, Newman R, Dennett C, Mount S (2013) Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wirel Commun Mob Comput 13(9):809–827

    Article  Google Scholar 

  10. Hammoudeh M, Newman R (2015) Information extraction from sensor networks using the watershed transform algorithm. Inform Fusion 22:39–49

    Article  Google Scholar 

  11. Majhi M, Pal AK, Pradhan J, Islam SKH, Khan MK (2021) Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multimed Tools Appl 1–33

  12. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55. IEEE

  13. Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Int Conf Appl Cryptogr Netw Sec 3531:442–455

    MATH  Google Scholar 

  14. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Sec 19(5):895–934

    Google Scholar 

  15. Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: Proceedings of the 2008 IEEE conference on computer vision and pattern recognition, pp 1–8. IEE

  16. Lu W, Swaminathan A, Varna AL, Wu M (2009) Enabling search over encrypted multimedia databases. Int Soc Opt Photon Media Forens Sec 7254:725418

    Google Scholar 

  17. Yuan J, Yu S, Guo L (2015) Seisa: secure and efficient encrypted image search with access control. In: Proceedings of the 2015 IEEE conference on computer communications (INFOCOM), pp 2083–2091. IEEE

  18. Xia Z, Xiong NN, Vasilakos AV, Sun X (2017) Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204

    Article  Google Scholar 

  19. Shen M, Cheng G, Zhu L, Xiaojiang D, Jiankun H (2020) Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Fut Gener Comput Syst 109:621–632

    Article  Google Scholar 

  20. Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 6(1):276–286

    Article  Google Scholar 

  21. Yuan X, Wang X, Wang C, Squicciarini AC, Ren K (2016) Towards privacy-preserving and practical image-centric social discovery. IEEE Trans Depend Sec Comput 15(5):868–882

    Article  Google Scholar 

  22. Bellafqira R, Coatrieux G, Bouslimi D, Quellec G (2015) Content-based image retrieval in homomorphic encryption domain. In: Proceeding of the 2015 37th annual international conference of the ieee engineering in medicine and biology society (EMBC), pp 2944–2947. IEEE

  23. Weng L, Amsaleg L, Morton A, Marchand-Maillet S (2014) A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans Inf Forens Sec 10(1):152–167

    Article  Google Scholar 

  24. Zhou J, Cao Z, Dong X, Lin X (2015) Ppdm: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332–1344

    Article  Google Scholar 

  25. Shengshan H, Wang Q, Wang J, Qin Z, Ren K (2016) Securing sift: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans Image Process 25(7):3411–3425

    Article  MathSciNet  MATH  Google Scholar 

  26. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forens Sec 11(11):2594–2608

    Article  Google Scholar 

  27. Steiner M, Tsudik G, Waidner M (1996) Diffie-hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security, pp 31–37

  28. William Rowan Hamilton (1866) Elements of quaternions. Green, & Company, Longmans

    MATH  Google Scholar 

  29. Ell TA, Sangwine SJ (2006) Hypercomplex fourier transforms of color images. IEEE Trans Image Process 16(1):22–35

    Article  MathSciNet  MATH  Google Scholar 

  30. Hosny KM, Darwish MM (2019) Feature extraction of color images using quaternion moments. Recent Adv Comput Vis 804:141–167

    Article  Google Scholar 

  31. Mukundan R, Ong SH, Lee PA (2001) Image analysis by tchebichef moments. IEEE Trans Image Process 10(9):1357–1364

    Article  MathSciNet  MATH  Google Scholar 

  32. Pradhan J, Kumar S, Pal AK, Banka H (2018) Texture and color visual features based CBIR using 2D DT-CWT and histograms. Int Conf Math Comput 834:84–96

    Article  Google Scholar 

  33. Feldman M (2011) Hilbert transform in vibration analysis. Mech Syst Signal Process 25(3):735–802

    Article  Google Scholar 

  34. Lin J (1991) Divergence measures based on the shannon entropy. IEEE Trans Inf Theory 37(1):145–151

    Article  MathSciNet  MATH  Google Scholar 

  35. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  36. Li J, Wang JZ (2008) Real-time computerized annotation of pictures. IEEE Trans Pattern Anal Mach Intell 30(6):985–1002

    Article  Google Scholar 

  37. Yanyan X, Zhao X, Gong J (2019) A large-scale secure image retrieval method in cloud environment. IEEE Access 7:160082–160090

    Article  Google Scholar 

  38. Yanyan X, Gong J, Xiong L, Zhengquan X, Wang J, Shi Y (2017) A privacy-preserving content-based image retrieval method in cloud environment. J Vis Commun Image Represent 43:164–172

    Article  Google Scholar 

  39. Majhi M, Pal AK, Islam SKH, Khurram KM (2021) Secure content-based image retrieval using modified Euclidean distance for encrypted features. Trans Emerg Telecommun Technol 32(2):e4013

    Google Scholar 

  40. Kundu MK, Chowdhury M, Bulo SR (2015) A graph-based relevance feedback mechanism in content-based image retrieval. Knowl Based Syst 73:254–264

    Article  Google Scholar 

  41. Chandra B, Varghese PP (2008) Fuzzy sliq decision tree algorithm. IEEE Trans Syst Man Cybern B (Cybern) 38(5):1294–1301

    Article  Google Scholar 

  42. Barjinder K, Dinesh S, Partha PR (2019) Age and gender classification using brain–computer interface. Neural Comput Appl 31(10):5887–5900

    Article  Google Scholar 

  43. Aslahi-Shahri BM, Rahmani R, Chizari M, Maralani A, Eslami M, Golkar MJ, Ebrahimi A (2016) A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl 27(6):1669–1676

    Article  Google Scholar 

  44. Bahrammirzaee A (2010) A comparative survey of artificial intelligence applications in finance: artificial neural networks, expert system and hybrid intelligent systems. Neural Comput Appl 19(8):1165–1195

    Article  Google Scholar 

  45. Nene Sameer A, Nayar Shree K, Murase H, et al (1996) Columbia object image library (coil-100)

  46. Produce-1400 Database. http://www.ic.unicamp.br/~rocha/pub/downloads/tropical-fruits-DB-1024x768.tar.gz/. Accessed: 2018-04-07

Download references

Acknowledgements

The author Mr. Sumit Kumar (Admission No: 2015DR0056) is supported by the institute Ph.D. scholarship, IIT[ISM], Dhanbad, Jharkhand, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to SK Hafizul Islam.

Ethics declarations

Conflict of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Pal, A.K., Islam, S. et al. Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput & Applic 35, 4855–4880 (2023). https://doi.org/10.1007/s00521-021-06054-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-06054-y

Keywords

Navigation