Abstract

Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. In this paper, a secure CBIR scheme based on an encrypted difference histogram (EDH-CBIR) is proposed. Firstly, the image owner calculates the order or disorder difference matrices of RGB components and encrypts them by value replacement and position scrambling. The encrypted images are then uploaded to the cloud server who extracts encrypted difference histograms as image feature vectors. To search similar images, the query image is encrypted by the image users as the image owner does, and the query feature vector is extracted by the cloud server. The Euclidean distance between query feature vector and image feature vector is calculated to measure the similarity. The security analysis and experiments demonstrate the usability of the proposed scheme.

Highlights

  • The number of images generated by all kinds of devices has been greatly increasing in recent years

  • This paper proposes a secure content-based image retrieval (CBIR) scheme based on encrypted difference histograms (EDH-CBIR)

  • A secure CBIR scheme is proposed by using encrypted difference features

Read more

Summary

Introduction

The number of images generated by all kinds of devices has been greatly increasing in recent years. To solve the privacy problems of outsourcing CBIR services, the existing secure CBIR schemes mainly take the following steps. The encrypted feature, index, and image are uploaded to the cloud server. In these CBIR schemes, the cloud server only provides storage and retrieval services. It is necessary to propose a secure CBIR scheme that can directly extract features from the ciphertext domain on the cloud server side. A specially designed image encryption method is proposed to support the feature extraction directly from the ciphertext domain. In EDH-CBIR, users only need to complete the work of image encryption, the feature extraction and index establishment will be completed by cloud server, which will largely reduce the user’s work.

Related Work
System and Security Model
The Proposed Scheme
Image Encryption
Feature Extraction and Index Construction
Image Retrieval
Security under COA Model
Security under the KBP Model
Experimental Results
Effectiveness of Image Encryption
Retrieval Accuracy
Efficiency
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call