Skip to main content
Log in

Towards efficient privacy-preserving encrypted image search in cloud computing

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the rapid development of cloud computing and big data, it is an ever-increasing trend to outsource the huge amount of multimedia data to the cloud. Although data outsourcing can alleviate data maintenance cost of user side, it inevitably brings some new security challenges, of which privacy of image content is the most significant one. Thus, privacy-preserving image search becomes a new research interest in academic community. In this paper, we propose a novel efficient search scheme for encrypted image by incorporating K-means and secure modular hashing, which can simultaneously achieve privacy-preserving of image search and comparable search accuracy to plaintext image. Furthermore, we provide comprehensively security analysis on the proposed solution and detailed efficiency evaluation over some real-world datasets. The results show that our solution can achieve desired security goals while providing a comparable search efficiency and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Agrawal, R, Kiernan, J, Srikant, R, Xu, Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574. ACM

  • Andoni, A, Indyk, P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 2006 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS’06., pp. 459–468

  • Boneh, D, Di Crescenzo, G, Ostrovsky, R, Persiano, G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506–522. Springer

  • Broder, A.Z, Charikar, M, Frieze, A.M, Mitzenmacher (1998) M Min-wise independent permutations. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 327–336. ACM

  • Chen P, Ye J, Chen X (2016) Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput 20(11):4589–4596

    Article  MATH  Google Scholar 

  • Cheng, B, Zhuo, L, Bai, Y, Peng, Y, Zhang, J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing (BdCloud), pp. 116–120. IEEE

  • Datar, M, Immorlica, N, Indyk, P, Mirrokni, V.S (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp. 253–262. ACM

  • Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics and Secur 12(8):1874–1884

    Article  Google Scholar 

  • Fu ZJ, Shu JG, Wang J, Liu YL, Lee SY (2015) Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. WHWgW 16(3):453–460

    Google Scholar 

  • He, K, Wen, F, Sun, J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2938–2945

  • Hirata, K, Kato, T (1992) Query by visual example. In: international conference on extending database technology, pp. 56–71. Springer

  • Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607

    Article  MathSciNet  MATH  Google Scholar 

  • Huang, K, Xu, M, Fu, S, Wang, D (2016) Efficient privacy-preserving content-based image retrieval in the cloud. In: International conference on web-age information management, pp. 28–39. Springer

  • Jégou, H, Douze, M, Schmid, C (2008) Hamming embedding and weak geometry consistency for large scale image search-extended version

  • Jiménez, A, Raj, B, Portelo, J, Trancoso, I (2015) Secure modular hashing. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp. 1–6. IEEE

  • Li, J, Li, J, Chen, X, Jia, C, Liu, Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: International conference on network and system security, pp. 490–502. Springer

  • Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics and Secur 10(3):507–518

    Article  Google Scholar 

  • Li P, Li T, Yao ZA, Tang CM, Li J (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):1–11

    MATH  Google Scholar 

  • Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91–110

    Article  MathSciNet  Google Scholar 

  • Lu, W, Swaminathan, A, Varna, A.L, Wu, M (2009) Enabling search over encrypted multimedia databases. In: Proceedings international society for optics and photonics IS&T/SPIE electronic imaging, pp. 725,418–725,418

  • Lu, W, Varna, A.L, Swaminathan, A, Wu, M (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009, pp. 1533–1536. IEEE

  • Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2:125–141

    Article  Google Scholar 

  • Shashank, J, Kowshik, P, Srinathan, K, Jawahar, C (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, 2008. CVPR 2008, pp. 1–8. IEEE

  • Shen, J, Shen, J, Chen, X, Huang, X, Susilo, W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics and Secur

  • Wang J, Miao M, Gao Y, Chen X (2016) Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput 20(11):4487–4495

    Article  Google Scholar 

  • Wong, W.K, Cheung, D.W.l, Kao, B, Mamoulis, N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139–152. ACM

  • Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

  • Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distrib Syst 27(2):340–352

    Article  Google Scholar 

  • Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics and Secur 11(11):2594–2608

    Article  Google Scholar 

  • Xia, Z, Zhu, Y, Sun, X, Qin, Z, Ren, K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput

  • Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. WHWgW 18(2):435–442

    Google Scholar 

  • Yuan, J, Yu, S, Guo, L (2015) Seisa: Secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083–2091. IEEE

  • Zhang, L, Jung, T, Feng, P, Li, X.Y, Liu, Y (2014) Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593

  • Zhang, L, Jung, T, Liu, C, Ding, X, Li, X.Y, Liu, Y (2015) Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th international conference on distributed computing systems (ICDCS), pp. 308–317. IEEE

  • Zhang, Y, Zhuo, L, Peng, Y, Zhang, J (2014) A secure image retrieval method based on homomorphic encryption for cloud computing. In: 2014 19th international conference on digital signal processing (DSP), pp. 269–274. IEEE

  • Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics and Secur 12(1):48–63

    Article  Google Scholar 

  • Zou, Q, Wang, J, Ye, J, Shen, J, Chen, X (2016) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput, pp. 1–11

Download references

Acknowledgements

This study was funded by the National Natural Science Foundation of China (Nos. 61572382 and 61702401), China 111 Project (No. B16037), National Key Research and Development Program of China (No. 2017YFB0802202), National High Technology Research and Development Program (863 Program) of China (No. 2015AA01 6007), Key Project of Natural Science Basic Research Plan in Shannxi Province of China (No. 2016JZ021), China Postdoctoral Science Foundation (No. 2017M613083) and the CICAEET fund and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Miao, M., Shen, J. et al. Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput 23, 2101–2112 (2019). https://doi.org/10.1007/s00500-017-2927-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2927-6

Keywords

Navigation