Abstract
With the popularity of smart devices and the Internet, the volume of multimedia data is growing rapidly, and content-based image retrieval (CBIR) can search for similar images from large-scale images to realize the utilization of the data. For data owners, outsourcing the management and maintenance of image data to cloud service providers can effectively reduce costs, but there is a privacy leakage problem. In this paper, we focus on image feature extraction, index design, and image similarity recognition methods under a dual server model with content-based image security similarity recognition as the research topic, the work done such as proposing a BOVW (Bag of Visual Word) feature-based image security similarity recognition scheme. The scheme combines SIFT (scale-invariant feature transform) feature secure extraction and locally sensitive hashing algorithm to achieve secure extraction of BOVW features of images. To protect the BOVW features of images, an inverted index based on word frequency division is designed, the index is stored in chunks, and an image secure similarity recognition scheme based on CNN (convolutional neural networks) features is proposed. The scalable hash index based on dimensional division is designed based on the image CNN features secure extraction algorithm. The security and performance of the proposed scheme are theoretically analyzed and experimentally verified. Based on different image datasets, the impact of different parameters on the performance of the scheme is tested, and optimized parameters are given. The experimental results show that the proposed scheme in this paper can effectively improve the efficiency of analyzing the similarity of plant botanical art images compared to the existing schemes.
Highlights
With the rapid development of the Internet, the process of information technology is becoming faster and faster, and a large amount of image data can be generated every second
The currently proposed image security similarity recognition schemes suffer from high computational complexity, high user workload, high communication overhead, and many interaction rounds and do not support the update of image data; studying image feature extraction, index construction, and image similarity comparison methods under cryptographic images is important and valuable to reduce the computational complexity and communication overhead of image security similarity recognition, and making full use of cloud server resources is of great significance and value [3]
We compare the effectiveness of the fused features proposed in the paper with some single features in performing image similarity recognition to verify the effectiveness of the fused features, and N time, and we verify the performance of the diffusion process in combining these different features for similarity recognition
Summary
With the rapid development of the Internet, the process of information technology is becoming faster and faster, and a large amount of image data can be generated every second. The currently proposed image security similarity recognition schemes suffer from high computational complexity, high user workload, high communication overhead, and many interaction rounds and do not support the update of image data; studying image feature extraction, index construction, and image similarity comparison methods under cryptographic images is important and valuable to reduce the computational complexity and communication overhead of image security similarity recognition, and making full use of cloud server resources is of great significance and value [3]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.