Skip to main content
Log in

Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

With the advancement of content-based medical image retrieval (CBMIR) technology which is used as a convenient assistant for medical diagnosis. However, the potential risk of privacy disclosure in CBMIR remains a concern due to the involvement of patients’ sensitive information in medical images. To address this issue, we have proposed an efficient scheme to achieve privacy-preserving medical image retrieval, named PMIR. The primary objective of PMIR is to enhance the accuracy of medical image retrieval while ensuring privacy protection. In PMIR, medical institutions with large repositories of medical images can securely upload to the cloud server with their image data and encryption indexes. Subsequently, users who successfully registered from medical institutions are able to enjoy convenient image retrieval services without revealing their sensitive information and query attributes to the cloud server. The proposed approach emphasizes a privacy-preserving policy mechanism, which empowers users with the right to choose rather than relying solely on service providers. Through rigorous security analysis, it is demonstrated that PMIR can effectively withstand various known security threats. Additionally, experimental results highlight the substantial reduction in communication overhead achieved by PMIR, ultimately providing a seamless and secure search experience for users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The IDRID datasets generated during and/or analyzed during the current study are available in the [IEEEDataPort] Datasets, [https://ieee-dataport.org/open-access/indian-diabetic-retinopathy-image-dataset-idrid]. The COVID-19 datasets generated during and/or analyzed during the current study are available in the [BIMCV Proyectos] Datasets, [https://bimcv.cipf.es/bimcv-projects/bimcv-covid19/#1590858128006-9e640421-6711].

References

  1. Zhang Y, Wei Y, Wu Q, Zhao P, Niu S, Huang J, Tan M (2020) Collaborative unsupervised domain adaption for medical image diagnosis. IEEE Transact Image Process 29:7834–7844

    Article  Google Scholar 

  2. Şaban Öztürk (2020) Stacked auto-encoder based tagging with deep features for content-based medical image retrieval. Expert Syst Appl 161:113693

    Article  Google Scholar 

  3. Divya S, Bakthula R, Suneetal A (2021) Content-based image retrieval for categorized dataset by aggregating gradient and texture features. Neural Comput Appl 33(19):12247–12261

    Article  Google Scholar 

  4. Zhang L, Jung T, Liu K, Li X, Ding X, Gu J, Liu Y (2017) Pic: Enable large-scale privacy preserving content-based image search on cloud. IEEE Transact Parallel Distrib Syst 28(11):3258–3271

    Article  Google Scholar 

  5. Pan X, Xu J, Meng X (2011) Protecting location privacy against locationdependent attacks in mobile services. IEEE Transact Knowl Data Eng 24(8):1506–1519

    Article  Google Scholar 

  6. Hwang RH, Hsueh YL, Chung HW (2013) A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transact Serv Comput 7(2):126–139

    Article  Google Scholar 

  7. Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure Knn computation on encrypted database. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp 139–152

  8. Xia Z, Xiong NN, Vasilakos AV, Ren K (2017) EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme incloud computing. Inf Sci 387:195–204

    Article  Google Scholar 

  9. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transact Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  10. Yuan J, Yu S, Guo L (2015) SEISA: secure and efficient encrypted image search with access control. In: Proceedings of the IEEE conference on computer communications (INFOCOM), pp 2083–2091

  11. Li Y, Ma J, Miao Y, Wang Y, Yang T, Liu X, R K-K (2020) Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Transact Cloud Comput 10(4):2936–2948

    Article  Google Scholar 

  12. Yuan J, Tian Y (2019) Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset. IEEE Transact Cloud Comput 7(2):568–579

    Article  Google Scholar 

  13. Li S, Wu L, Meng W (2022) DVPPIR: privacy-preserving image retrieval based on DCNN and VHE. Neural Comput Appl 34(17):14355–14371

    Article  Google Scholar 

  14. Li Y, Ma J, Miao Y, Wang Y, Liu X, Choo K-KR (2022) Similarity search for encrypted images in secure cloud computing. IEEE Transact Cloud Comput 10(2):1142–1155

    Article  Google Scholar 

  15. Long J, Shelhamer E, Darrell T (2015) Fully convolutional networks for semantic segmentation. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR)

  16. Doorsamy W, Rameshar V (2023) Investigation of PCA as a compression pre-processing tool for X-ray image classification. Neural Comput Appl 35(2):1099–1109

    Article  Google Scholar 

  17. Li D, Liao X, Xiang T, Wu J, L J (2019) Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. Comput Secur 90:101701

    Article  Google Scholar 

  18. Boneh D, Drijvers M, Neven G (2018) Compact multi-signatures for smaller blockchains. In: Proceedings of the international conference on the theory and application of cryptology and information security, pp 435–464

  19. Zhu H, Lu R, Huang C, Chen L, Li H (2015) An efficient privacypreserving location-based services query scheme in outsourced cloud. IEEE Transact Veh Technol 65(9):7729–7739

    Article  Google Scholar 

  20. Li D, Wu J, Le J, Liao X, Xiang T (2023) A novel privacy-preserving location-based services search scheme in outsourced cloud. IEEE Transact Cloud Comput 11(1):457–469

    Article  Google Scholar 

  21. Menezes A (2009) An introduction to pairing-based cryptography. Recent Trends Cryptogr 477:47–65

    Article  MathSciNet  Google Scholar 

  22. Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of the conference on theory cryptography, pp 325–341

  23. Zhu D, Zhu H, Wang X, Lu R, D F (2022) An accurate and privacy-preserving retrieval scheme over outsourced medical images. IEEE Trasnact Serv Comput 16(2):913–926

    Article  Google Scholar 

  24. Tong Q, Miao T, Chen L, Weng J (2021) Vfirm: verifiable fine-grained encrypted image search in multi-owner multi-user settings. IEEE Transact Serv Comput 15(6):3606–3619

    Article  Google Scholar 

  25. Porwal P, Pachade S, Kamble R, Kokare M, Deshmukh G, Sahasrabuddhe V, Meriaudeau F, Indian diabetic retinopathy image dataset (IDRiD), https://doi.org/10.21227/H25W98

  26. Chowdhury MEH, Rahman T, Khandakar A, Mazhar R, Kadir MA, Mahbub ZB, Islam KR, Khan MS, Iqbal A, Emadi NA, Reaz MBI, Islam MT (2020) Can ai help in screening viral and covid-19 pneumonia? IEEE Access 8:132665–132676

    Article  Google Scholar 

  27. Rahman T, Khandakar A, Qiblawey Y, Tahir A (2021) Exploring the effect of image enhancement techniques on covid-19 detection using chest x-ray images. Comput Biol Med 132:104319

    Article  Google Scholar 

  28. Koushik P, Goutam G, Subhajit K, Mahua B (2013) A new combined crypto-watermarking technique using RSA algorithm and discrete cosine transform to retrieve embedded EPR from noisy bio-medical images. In: Proceedings of the 1st international conference on condition assessment techniques in electrical systems (CATCON), pp 368–373

  29. Yang RE, Zheng Z, Tao S, Ding S (2014) Image steganography combined with DES encryption pre-processing. In: proceedings of the 6th international conference on measuring technology and mechatronics automation, pp 323–326

  30. Zhang Y (2018) Test and verification of AES used for image encryption. 3D Res 9(1):3–10

    Article  Google Scholar 

  31. Chen Z (2012) A lightweight encryption algorithm for images, affective computing and intellignet. Interaction 137:235–241

    Google Scholar 

  32. Su YR, Wo Y, Han GQ (2019) Reversible cellular automata image encryption for similar search. Signal Process Image Commun 72:134–147

    Article  Google Scholar 

  33. Ye G, Huang X (2018) Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China (Information Science) 61(5):315–325

    MathSciNet  Google Scholar 

  34. Xu WJ, Xiang SJ, Sachnev V (2018) A cryptograph domain image retrieval method based on paillier homomorphic block encryption. CMC Comput Mater Contin 55(2):285–295

    Google Scholar 

  35. Abduljabbar ZA, Jin H, Ibrahim A (2017) Privacy-preserving image retrieval in IoT-Cloud. In: Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, pp 799–806

  36. Xia ZH, Xiong N, Vasilakos V (2017) EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci Int J 387:195–204

    Google Scholar 

  37. Xia ZH, Zhu Y, Sun XM (2018) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Transact Cloud Comput 6(1):276–286

    Article  Google Scholar 

  38. Levina E, Bickel P (2001) The earth mover’s distance is the mallows distance: some insights from statistics. In: Proceedings of the 8th IEEE international conference on computer vision (ICCV), pp 251–256

  39. Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1–8

  40. Shen M, Cheng G, Zhu L, Du X, Hu J (2020) Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener Comput Syst 109:621–632

    Article  Google Scholar 

  41. Nasir R, Jamil A, Khan M (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75–85

    Article  Google Scholar 

  42. Huang D, Geng X, Wei L, Su C (2016) A secure query scheme on encrypted remote sensing images based on Henon mapping. J Softw 27:1723–1740

    MathSciNet  Google Scholar 

  43. Zhou ZL, Wang Y, Wu J, Yang C (2017) Effective and efficient global context verification for image copy detection. IEEE Transact Inf Forensics Secur 12(1):48–63

    Article  Google Scholar 

  44. Devaraj AFS, Murugaboopathi G, Elhoseny M, Shankar K, Moon K, min H (2020) An efficient framework for secure image archival and retrieval system using multiple secret share creation scheme. IEEE Access 8:144310–144320

    Article  Google Scholar 

  45. Liu Y, Ma Z, Liu X, Ma S, Ren K (2022) Privacy-preserving object detection for mrdical images with faster r-cnn. IEEE Transact Inf Forensics Secur 17:69–84

    Article  Google Scholar 

  46. Lu H, Zhang M, Xu X, Li Y, Shen HT (2021) Deep fuzzy hashing network for efficient image retrieval. IEEE Transact Fuzzy Syst 29(1):166–176

    Article  Google Scholar 

  47. Kumar S, Pal A, Islam SK, Hammoudeh M (2023) Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput Appl 35(7):4855–4880

    Article  Google Scholar 

  48. Ahmad AB, Chen L, Saru V (2022) Fast homomorphic SVM inference on encrypted data. Neural Comput Appl 34(18):15555–15573

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by the Sichuan Key Laboratory of Smart Grid (Sichuan University) under grant 2023-IEPGKLSP-KFYB01, in part by the Natural Science Foundation of China under grants 62302068 and 62072061, in part by the Natural Science Foundation of Chongqing under grant CSTB2022NSCQ-MSX1627, in part by the China Postdoctoral Science Foundation under grant 2021M700588, in part by the project of Key Laboratory of Industrial Internet of Things & Networked Control, Ministry of Education under grant 2021FF09, in part by the Fundamental Research Funds for the Central Universities under grant 2023CDJXY-039, in part by the Chongqing Postdoctoral Science Foundation under grant 2021XM1006, in part by the National Key R&D Program of China under grant 2020YFB1805400 and 2022YFC3801700.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Qingguo Lü or Zheng Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, D., Wu, Y., Lü, Q. et al. Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario. Neural Comput & Applic 36, 1477–1493 (2024). https://doi.org/10.1007/s00521-023-09118-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-023-09118-3

Keywords

Navigation