Abstract
In this paper, we propose a block-based transformation algorithm to achieve the purpose of image content protection. More importantly, under the proposed image content protection framework, image retrieval and image convolution can also be performed directly on the content-protected images. As a consequence, not only secure image storage and communication are accomplished, but also the computation efforts can be fully distributed, thus making it a perfect match for nowadays popular cloud computing technology. Security analyses are conducted to prove that the proposed image encryption scheme offers certain degree of security in both statistical and computational aspects. Although a higher data confidentiality may be reached by adopting traditional cryptographic encryption algorithms, we believe it could be accepted by ordinary users with general image storage needs, since extra functionalities, i.e. content-based image retrieval and image convolution, are provided. Experimental results also demonstrate the decent performance of the proposed encryption domain image retrieval and convolution with acceptable storage overhead.












Similar content being viewed by others
References
Bianchi T, Piva A, Barni M (2009) Encrypted domain dct based on homomorphic cryptosystems. EURASIP J Inf Secur:1:1–1:12. doi:10.1155/2009/716357
Bober M (2001) MPEG-7 Visual Shape Descriptor. IEEE Transactions on Circuits and Systems for Video Technology 11(6):716–719
Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2008) A joint digital watermarking and encryption method. SPIE 6819:68191C
Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12
Chu KY, Kuo YH, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia, MM ’13, pp 597–600
Demaine ED, Demaine ML (2007) Jigsaw puzzles, edge matching, and polyomino packing: connections and complexity. Graphs and Combinatorics 23:195–208
Deselaers T, Keysers D, Ney H (2008) Features for image retrieval: an experimental comparison. J Image Retr 11(2):77–107
Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 7 (2):1–20
Ferguson N, Schneier B, Kohno T (2010) Cryptography engineering: design principles and practical applications. Wiley
Fisher RA, Yates F (1938) Statistical tables for biological, agricultural and medical research, 3rd edn. Oliver & Boyd, London
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:1–15
Gautam A, Panwar M, Gupta P (2011) A new image encryption approach using block based transformation algorithm. Int J Adv Eng Sci Tech 8(1):90–96
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
Hsu CY, Lu CS, Pei SC (2011) Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. SPIE 7880:788005
Huang ZC, Chan PK, Ng WY, Yeung DS (2010) Content-based image retrieval using color moment and gabor texture feature. In: Proceedings of the ninth international conference on machine learning and cybernetics, pp 719–724
Jeong S, Won CS, Gary RM (2004) Image retrieval using color histograms generated by gauss mixture vector quantization. Comp Vision Image Underst 94 (1–3):44–66
Jolfaei A, Mirghadri A (2010) An image encryption approach using chaos and stream cipher. J Theor Appl Inf Technol 19(2):117–125
Kelsey J, Schneier B, Ferguson N (2000) Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: Proceedings of the 6th annual international workshop on selected areas in cryptography, SAC ’99, pp 13–33
Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimedia Comput Commun Appl 11(3):38:1–38:24. doi:10.1145/2656205
Lathey A, Atrey PK, Joshi N (2013) Homomorphic low pass filtering on encrypted multimedia over cloud. In: ICSC. IEEE, pp 310–313
Lowe DG (1999) Object recognition from local scale-invariant features. In: International conference on computer vision, pp 1150–1157
Lu W, Swaminathan A, Varna AL, Wu M (2009) Enabling search over encrypted multimedia databases. In: SPIE/IS&T media forensics and security, vol 7254. SPIE, p 725418
Lu W, Varna AL, Swaminathan A, Wu M (2009) Secure image retrieval through feature protection. In: IEEE conference on acoustics, speech and signal processing, pp 1533–1536
Maniccam S, Bourbakis N (2001) Lossless Image Compression and Encryption using SCAN. Pattern Recognit 34:1229–1245
Manjunath B, Ma W (1996) Texture features for browsing and retrieval of image data. IEEE Transactions on Pattern Analysis and Machine Intelligence 18(8):837–842
Melchor CA, Fau S, Fontaine C, Gogniat G, Sirdey R (2013) Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process Mag 30(2):108–117
Mitra A, Rao YVS, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. J Comput Sci 1(1):127–131
Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, CCSW ’11, pp 113–124
Park M, Jin JS, Wilson LS (2002) Fast content-based image retrieval using quasi-gabor filter and reduction of image feature dimension. In: IEEE southwest symposium on image analysis and interpretation, pp 178–182
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164. doi:10.1016/j.jvcir.2015.06.009
Rakesh S, Ajitkumar AK, Shadakshari BC, B A (2012) Image encryption using block based uniform scrambling and chaotic logistic mapping. Int J Crypt Inf Secur (IJCIS) 2(1):49–57
Shamir A. (1979) How to share a secret. Commun ACM 22(11):612–613
Sharma N, Rawat P, Singh J (2011) Efficient CBIR using color histogram processing. Signal & Image Process Int J (SIPIJ) 2(1):94–112
Shih J, Chen LH (2002) Colour image retrieval based on primitives of colour moments. In: Proceedings of the 5th international conference on recent advances in visual information systems, pp 88–94
Subramanyam A, Emmanuel S, Kankanhalli M (2012) Robust watermarking of compressed and encrypted jpeg2000 images. IEEE Trans Multimed 14(3):703–716. doi:10.1109/TMM.2011.2181342
Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV Efficient privacy preserving video surveillance. In: ICCV. IEEE, pp 1639–1646
Wang JZ, Li J, Wiederhold G (2001) Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans Pattern Anal Mach Intell 23:947–963
Wang LT, McCluskey EJ (1988) Linear feedback shift register design using cyclic codes. IEEE Trans Comput 37(10):1302–1306
Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82, pp 160–164
Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic map. Commun Nonlinear Sci Numer Simul 15 (12):3998–4006
Younes MAB, Jantan A (2008) An image encryption approach using a combination of permutation technique followed by encryption. Int J Comput Sci Netw Secur 8 (4):191–197
Zeng W, Lei S (2002) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimed 5:118–129
Zhang X, Cheng H (2014) Histogram-based retrieval for encrypted jpeg images. In: 2014 IEEE china summit international conference on signal and information processing (ChinaSIP), pp 446–449. doi:10.1109/ChinaSIP.2014.6889282
Acknowledgments
The authors thank the anonymous reviewers’ spending valuable time reviewing and giving out useful comments. We also would like to thank Nick Leaf for proof-reading the paper and providing suggestions on how to address the reviewers’ comments. This work was supported in part by the Ministry of Science and Technology, Taiwan under the grant NSC 101-2221-E-011-150-MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chou, JK., Yang, CK. & Chang, HC. Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm. Multimed Tools Appl 75, 13805–13832 (2016). https://doi.org/10.1007/s11042-015-2917-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2917-6