Skip to main content
Log in

AC-coefficient histogram-based retrieval for encrypted JPEG images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a novel retrieval scheme for encrypted JPEG images. With this scheme, the DC and AC coefficients of JPEG images are encrypted using a stream cipher and scrambling encryption, respectively. Then, the encrypted images are transmitted to and stored in a server, which can also provide retrieval service. When receiving an encrypted query image, the server without any knowledge of the plaintext content may acquire statistically its AC coefficients histogram. By calculating the distances between the histograms of encrypted query image and database image, the server may output the encrypted images closest to the query image to the authorized user.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. Freely available at http://wang.ist.psu.edu/docs/related/

References

  1. Boneh D, Di Crescenzo G, Ostrovsky R et al (2004) Public-key encryption with keyword search. Adv Cryptol-Eurocrypt 2004:506–522

    MathSciNet  MATH  Google Scholar 

  2. Cao N, Wang C, Li M et al (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib Syst IEEE Trans 25:222–233

    Article  Google Scholar 

  3. Curtmola R, Garay J, Kamara S et al (2006) Searchable symmetric encryption: improved definitions and efficient constructions. Proceedings of the 13th ACM conference on Computer and Communications Security, 79–88

  4. Erkin Z, Franz M, Guajardo J et al (2009) Privacy-preserving face recognition. Privacy Enhancing Technologies, 235–253

  5. Fanti G, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30:53–61

    Article  Google Scholar 

  6. Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive, 216

  7. Int. Telecommunication Union, CCITT Recommendation T.81, Information Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines 1992

  8. Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. Financial Cryptography and Data Security, 258–274

  9. Li J, Wang Q, Wang C et al (2010) Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of INFOCOM 2010, 1–5

  10. Lu W, Swaminathan A, Varna AL et al (2009) Enabling Search over Encrypted Multimedia Databases. IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 725418–725418

  11. Lu W, Varna AL, Swaminathan A et al (2009) Secure Image Retrieval through Feature Protection. Proc. of the 2009 I.E. International Conference on Acoustics, Speech and Signal Processing, 1533–1536

  12. Lu W, Varna A, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. Access IEEE 2:125–141

    Article  Google Scholar 

  13. Qian Z, Zhang X, Ren Y (2015) JPEG encryption for image rescaling in the encrypted domain. J Vis Commun Image Represent 26:9–13

    Article  Google Scholar 

  14. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimedia 16:1486–1491

    Article  Google Scholar 

  15. Ra M R, Govindan R, and Ortega A (2013) P3: Toward privacy-preserving photo sharing. NSDI. 515–528

  16. Shashank J, Kowshik P, Srinathan K et al (2008) Private content based image retrieval. Computer Vision and Pattern Recognition, 2008, CVPR 2008, IEEE conference on, 1–8

  17. Shi E, Bethencourt J, Chan TH et al (2007) Multi-dimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, 2007 (SP’07), 350–364

  18. Song D X, Wagner D, and Perrig A (2000) Practical techniques for searches in encrypted data. IEEE Symposium on Research in Security and Privacy, 44–55

  19. Sudharsanan S (2005) Shared key encryption of JPEG color images. Consum Electron IEEE Trans 51:1204–1211

    Article  Google Scholar 

  20. Wang C, Cao N, Li J et al (2010) Secure ranked keyword search over encrypted cloud data. In IEEE 30th International Conference on Distributed Computing Systems, 253–262

  21. Wang C, Ren K, Yu S, et al (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM, 2012 Proceedings IEEE, 451–459

  22. Zhang X and Cheng H (2014) Histogram-based retrieval for encrypted JPEG images. Signal and Information Processing (ChinaSIP), 2014 I.E. China Summit & International Conference on, 446–449

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants 61472235, 61373151, 61272043 and 61202367, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010, the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hang Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, H., Zhang, X. & Yu, J. AC-coefficient histogram-based retrieval for encrypted JPEG images. Multimed Tools Appl 75, 13791–13803 (2016). https://doi.org/10.1007/s11042-015-2741-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2741-z

Keywords

Navigation