Abstract

Every day social multimedia applications generate millions of images. To handle such huge amount of images, an optimal solution is using the public cloud, since it has powerful storage capability. Images usually contain a wealth of sensitive information, therefore social service providers need not only to provide services such as retrieval and sharing but also to protect the privacies of the images. In this paper, we propose a privacy-preserving scheme for content-based image retrieval and sharing in social multimedia applications. First, the users extract visual features from the images, and perform locality-sensitive hashing functions on visual features to generate image profile vectors. We then model the retrieval on the images as the equality search on the image profile vectors. To enable accurate and efficient retrieval, we design the secure index structure based on cuckoo hashing, which has constant lookup time. To meet the requirements of dynamic image updating, we enrich our service with image insertion and deletion. In order to reduce the key management overhead and the access control overhead in social applications, we process keys using secret sharing techniques to enable the users holding similar images to query and decrypt images independently. Finally we implement the prototype of the proposed scheme, and perform experiments over encrypted image databases.

Highlights

  • Due to the popularity of mobile devices with cameras, such as mobile phones, tablets, sensors, and etc., the amount of images has grown tremendously

  • We propose a privacy-preserving content-based image retrieval and sharing scheme for social multimedia applications

  • PRELIMINARIES we introduce the basic primitives that are used in our privacy-preserving image retrieval and sharing scheme

Read more

Summary

INTRODUCTION

Due to the popularity of mobile devices with cameras, such as mobile phones, tablets, sensors, and etc., the amount of images has grown tremendously. We propose a privacy-preserving content-based image retrieval and sharing scheme for social multimedia applications. Under the assumption that the social service providers are trusted entities, Yuan et al [13] and Ahmed et al [14] designed privacy-preserving image-centric social discovery schemes, which give the secret keys to the social service providers for storage and delegate the decryption operations to the social service providers. Such assumption is not always reasonable in real-world applications. In eLSH, the concatenation of k functions reduces the chance of collision between similar items and the set of L functions improves recall

CUCKOO HASHING
SECRET SHARING
CLOSENESS DOMAINS
SYSTEM OVERVIEW
CONSTRUCTION
33: Next: 34
2: Retrieval on SS: 3
40: Retrieval on CS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.