Skip to main content

Advertisement

Log in

DVPPIR: privacy-preserving image retrieval based on DCNN and VHE

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

With 5G and Internet technologies developing rapidly, outsourcing images to cloud servers has attracted growing attention. In existing technologies, images are often outsourced to cloud servers to reduce storage and computing burdens. However, outsourcing images to cloud servers without any processing may reveal the users’ privacy, because the images may contain sensitive information about users, such as faces and locations, especially in electronic investigation. To overcome the security problems in image retrieval, we propose a privacy-preserving image retrieval scheme based on deep convolutional neural network (DCNN) and vector homomorphic encryption (VHE). We adopt DCNN and hash algorithms to extract image feature vectors, which improves retrieval accuracy. By combining VHE and K-means outsourcing clustering algorithms, the cloud server can build encrypted index trees, which speeds up the search and reduces the computational cost. In addition, a lightweight access control technique is used to allow image owners to set access policies for datasets flexibly. We prove the security of the proposed scheme and show the effectiveness of the scheme through experiments. Our scheme is suitable for application in electronic image investigation systems (EIIs) to optimize the storage and search of police data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Fernández J, Cañas JM, Fernández V, Paniego S (2021) Robust real-time traffic surveillance with deep learning. Comput Intell Neurosci. https://doi.org/10.1155/2021/4632353

    Article  Google Scholar 

  2. Yang H, Zhou Q, Ni J, Li H, Shen X (2020) Accurate image-based pedestrian detection with privacy preservation. IEEE Trans Veh Technol 69(12):14494–14509. https://doi.org/10.1109/TVT.2020.3043203

    Article  Google Scholar 

  3. Liu Y, Ma Z, Liu X, Ma S, Ren K (2022) Privacy-preserving object detection for medical images with faster r-cnn. IEEE Trans Inf Forensics Secur 17:69–84. https://doi.org/10.1109/TIFS.2019.2946476

    Article  Google Scholar 

  4. Agrawal M, Rao HR, Sanders GL (2003) Impact of mobile computing terminals in police work. J Organ Comput Electron Commer 13(2):73–89. https://doi.org/10.1207/S15327744JOCE1302_1

    Article  Google Scholar 

  5. Doan NQ, Nghiem TP, Tran GS (2016) Dynamic indexing for content-based image retrieval systems using hierarchical and topological network. In: 2016 Eighth international conference on knowledge and systems engineering (KSE), pp. 351–356 . https://doi.org/10.1109/kse.2016.7758079

  6. Durmaz O, Bilge HS (2019) Fast image similarity search by distributed locality sensitive hashing. Pattern Recognit Lett 128:361–369. https://doi.org/10.1016/j.patrec.2019.09.025

    Article  Google Scholar 

  7. Zenggang X, Zhiwen T, Xiaowen C, Xue-min Z, Kaibin Z, Conghuan Y (2019) Research on image retrieval algorithm based on combination of color and shape features. J Signal Proces Syst. https://doi.org/10.1007/s11265-019-01508-y

    Article  Google Scholar 

  8. Parthasarathy R, Bhowmik RT (2021) Quantum optical convolutional neural network: a novel image recognition framework for quantum computing. IEEE Access 9:103337–103346. https://doi.org/10.1109/ACCESS.2021.3098775

    Article  Google Scholar 

  9. Bansal A, Chen T, Zhong S (2011) Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput Appl 20(1):143–150. https://doi.org/10.1007/s00521-010-0346-z

    Article  Google Scholar 

  10. Xiahou J, Lin F, Huang Q, Zeng W (2018) Multi-datacenter cloud storage service selection strategy based on ahp and backward cloud generator model. Neural Comput Appl 29(1):71–85. https://doi.org/10.1007/s00521-016-2364-y

    Article  Google Scholar 

  11. Shi Y, Lv Z, Bi N, Zhang C (2020) An improved sift algorithm for robust emotion recognition under various face poses and illuminations. Neural Comput Appl 32(13):9267–9281. https://doi.org/10.1007/s00521-019-04437-w

    Article  Google Scholar 

  12. Chen Y, Ping Y, Zhang Z, Wang B, He S (2021) Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT. Neural Comput Appl 33(10):4677–4694. https://doi.org/10.1007/s00521-020-05426-0

    Article  Google Scholar 

  13. Wu Y, Zhai H, Li M, Cui F, Wang L, Patil N (2019) Learning image convolutional representations and complete tags jointly. Neural Comput Appl 31(7):2593–2604. https://doi.org/10.1007/s00521-017-3216-0

    Article  Google Scholar 

  14. Santos I, Castro L, Rodriguez-Fernandez N, Torrente-Patino A, Carballal A (2021) Artificial neural networks and deep learning in the visual arts: A review. Neural Comput Appl 33(1):121–157. https://doi.org/10.1007/s00521-020-05565-4

    Article  Google Scholar 

  15. Meng W, Mao C, Zhang J, Wen J, Wu D (2019) A fast recognition algorithm of online social network images based on deep learning. Traitement du Signal . https://doi.org/10.18280/ts.360613

  16. Hao L-Y, Li J, Guo G (2020) A multi-target corner pooling-based neural network for vehicle detection. Neural Comput Appl 32(18):14497–14506. https://doi.org/10.1007/s00521-019-04486-1

    Article  Google Scholar 

  17. Song W, Li S, Benediktsson JA (2021) Deep hashing learning for visual and semantic retrieval of remote sensing images. IEEE Trans Geosci Remote Sens 59(11):9661–9672. https://doi.org/10.1109/TGRS.2020.3035676

    Article  Google Scholar 

  18. Peng T-Q, Li F (2017) Image retrieval based on deep convolutional neural networks and binary hashing learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 1742–1746 . https://doi.org/10.1109/ICASSP.2017.7952455

  19. Lin K, Yang H-F, Hsiao J-H, Chen C-S (2015) Deep learning of binary hash codes for fast image retrieval. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 27–35 . https://doi.org/10.1109/CVPRW.2015.7301269

  20. Yuan J, Yu S, Guo L (2015) SEISA: secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083–2091. https://doi.org/10.1109/infocom.2015.7218593

  21. Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY (2020) Fawkes: protecting privacy against unauthorized deep learning models. In: 29th \(\{\)USENIX\(\}\) security symposium (\(\{\)USENIX\(\}\) security 20), pp. 1589–1604 . https://doi.org/10.1109/spw.2019.00021

  22. Liu Y, Yu J, Fan J, Vijayakumar P, Chang V (2021) Achieving privacy-preserving dsse for intelligent iot healthcare system. IEEE Trans Ind Inform 18(3):2010–2020. https://doi.org/10.1109/tii.2021.3100873

    Article  Google Scholar 

  23. Barzegar R, Sattarpour M, Deo R, Fijani E, Adamowski J (2020) An ensemble tree-based machine learning model for predicting the uniaxial compressive strength of travertine rocks. Neural Comput Appl 32(13):9065–9080. https://doi.org/10.1007/s00521-019-04418-z

    Article  Google Scholar 

  24. Paillier P, Pointcheval D (1999) Efficient public-key cryptosystems provably secure against active adversaries. In: International conference on the theory and application of cryptology and information security, pp. 165–179. https://doi.org/10.1007/978-3-540-48000-6_14

  25. Jiang L, Xu C, Wang X, Luo B, Wang H (2017) Secure outsourcing sift: efficient and privacy-preserving image feature extraction in the encrypted domain. IEEE Trans Dependable Secur Comput 17(1):179–193. https://doi.org/10.1109/TDSC.2017.2751476

    Article  Google Scholar 

  26. Xia Z, Jiang L, Liu D, Lu L, Jeon B (2019) BOEW: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2019.2927215

    Article  Google Scholar 

  27. Kumar S, Pal AK, Islam S, Hammoudeh M (2021) Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06054-y

    Article  Google Scholar 

  28. Alkhelaiwi M, Boulila W, Ahmad J, Koubaa A, Driss M (2021) An efficient approach based on privacy-preserving deep learning for satellite image classification. Remote Sens 13(11):2221. https://doi.org/10.3390/rs13112221

    Article  Google Scholar 

  29. Yan Y, Xu Y, Zhang Y, Wang Z, Rao Z (2022) Privacy-preserving content-based image retrieval in edge environment. Clust Comput 25(1):363–381. https://doi.org/10.1007/s10586-021-03404-2

    Article  Google Scholar 

  30. Anju J, Shreelekshmi R (2022) A faster secure content-based retrieval for cloud. Expert Syst Appl. https://doi.org/10.1016/j.eswa.2021.116070

    Article  Google Scholar 

  31. Zhang L, Sheng Z, Li Y, Sun Q, Zhao Y, Feng D (2020) Image object detection and semantic segmentation based on convolutional neural network. Neural Comput Appl 32(7):1949–1958. https://doi.org/10.1007/s00521-019-04491-4

    Article  Google Scholar 

  32. Kahaki SM, Nordin M, Ahmad NS, Arzoky M, Ismail W et al (2020) Deep convolutional neural network designed for age assessment based on orthopantomography data. Neural Comput Appl 32(13):9357–9368. https://doi.org/10.1007/s00521-019-04449-6

    Article  Google Scholar 

  33. Hemanth DJ, Deperlioglu O, Kose U (2020) An enhanced diabetic retinopathy detection and classification approach using deep convolutional neural network. Neural Comput Appl 32(3):707–721. https://doi.org/10.1007/s00521-018-03974-0

    Article  Google Scholar 

  34. Li X, Yang J, Ma J (2021) Recent developments of content-based image retrieval (cbir). Neurocomputing 452:675–689. https://doi.org/10.1016/j.neucom.2020.07.139

    Article  Google Scholar 

  35. Liu H, Wang R, Shan S, Chen X (2016) Deep supervised hashing for fast image retrieval. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2064–2072 . https://doi.org/10.1109/cvpr.2016.227

  36. Liu C, Ma J, Tang X, Liu F, Zhang X, Jiao L (2020) Deep hash learning for remote sensing image retrieval. IEEE Trans Geosci Remote Sens 59(4):3420–3443. https://doi.org/10.1109/TGRS.2020.3007533

    Article  Google Scholar 

  37. Zhang C, Zhu L, Zhang S, Yu W (2020) TDHPPIR: an efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406:386–398. https://doi.org/10.1016/j.neucom.2019.11.119

    Article  Google Scholar 

  38. Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo K-KR (2017) Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3–9. https://doi.org/10.1016/j.csi.2016.05.002

    Article  Google Scholar 

  39. Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 568–588 . https://doi.org/10.1007/978-3-642-20465-4_31

  40. Zhou H, Wornell G (2014) Efficient homomorphic encryption on integer vectors and its applications. In: 2014 information theory and applications workshop (ITA), pp. 1–9 . https://doi.org/10.1109/ITA.2014.6804228

Download references

Acknowledgements

This work was supported in part by the Natural Science Foundation of Shandong Province under Grant ZR2020MF056, in part by Henan Key Laboratory of Network Cryptography Technology (LNCT2021-A12), in part by the National Natural Science Foundation of China under Grant 62071280, and in part by the Major Scientific and Technological Innovation Project of Shandong Province under Grant 2020CXGC010115.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Wu.

Ethics declarations

Conflict of interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, S., Wu, L., Meng, W. et al. DVPPIR: privacy-preserving image retrieval based on DCNN and VHE. Neural Comput & Applic 34, 14355–14371 (2022). https://doi.org/10.1007/s00521-022-07286-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-07286-2

Keywords

Navigation