Signal and Information Processing

Encrypted JPEG Image Retrieval Based on Dynamic BoW Model

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2017-02-21

  Revised date: 2017-06-03

  Online published: 2018-07-31

Abstract

This paper presents an efficient and dynamic retrieval scheme for encrypted JPEG images, which is based on the histogram of AC coefficients. First, the robust bagof-word (BoW) model is constructed in the encrypted domain via the advanced k-means clustering. Second, the local features of images are transformed into the global statistical histograms by the dynamic BoW model. Finally, the cloud server uses the histograms of the encrypted images to judge similarity. Besides, dynamic update operations like insertion and deletion of images are also available, so the retrieval scheme is still robust and efficient. The results of experiments show that the proposed scheme can improve the retrieval efficiency and ensure the accuracy of retrieval at the same time, having practical application value.

Cite this article

WEI Qiu-han, LIANG Hai-hua, ZHANG Xin-peng . Encrypted JPEG Image Retrieval Based on Dynamic BoW Model[J]. Journal of Applied Sciences, 2018 , 36(4) : 628 -634 . DOI: 10.3969/j.issn.0255-8297.2018.04.006

References

[1] Ren K, Wang C, Wang Q. Security challenges for the public cloud[J]. Internet Computer, 2012, 16(1):69-73.
[2] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy, Berkeley, USA, 2000:44-55.
[3] Chang Y C, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data[C]//Proceeding of the Third International Conference on Applied Cryptography and Network Security, New York, NY, USA, 2005:442-455.
[4] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proceedings of 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006:79-88.
[5] Boneh D, Kushilevitz E, Ostrovsky R, Skeith Ⅲ W E. Public key encryption that allows pir queries[C]//Proceedings of 27th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA, 2007:50-67.
[6] Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Rosu M C, Steiner M. Dynamic searchable encryption in very large databases:data structures and implementation[C]//Proceedings of 21st Network and Distributed System Security Symposium, San Diego, California, USA, 2014.
[7] Xia Z, Wang X, Sun X, Wang Q. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions Parallel and Distributed Systems, 2016, 27(2):340-352.
[8] Li H, Liu D, Dai Y, Luan T, Yu S. Personalized search over encrypted data with efficient and secure updates in mobile clouds[J]. IEEE Transactions Emerging Topics in Computing, 2018, 6(1):97-109.
[9] Lu W, Varna A L, Swaminathan A, Wu M. Secure image retrieval through feature protection[C]//Proceedings of 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Washington, DC, USA, 2009:1533-1536.
[10] Lu W, Swaminathan A, Varna A L, Wu M. Enabling search over encrypted multimedia databases[C]//IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2009:725418-725418.
[11] Hsu C Y, Lu C S, Pei S C. Image feature extraction in encrypted domain with privacy-preserving SIFT[J]. IEEE Transactions Image Processing, 2012, 21(11):4593-4607.
[12] Zhang X, Cheng H. Histogram-based retrieval for encrypted JPEG images[C]//Proceeding of IEEE China Summit & International Conference on Signal and Information Processing, Xi'an, China, 2014:446-449.
[13] Cheng H, Zhang X, Yu J, Li F. Markov process-based retrieval for encrypted JPEG images[J]. EURASIP Journal on Information Security, 2016:1-9.
[14] Cheng H, Zhang X, Yu J, Zhang Y. Encrypted JPEG image retrieval using block-wise feature comparison[J] Visual Communication and Image Representation, 2016:111-117.
[15] Lian S, Sun J, Wang Z. A novel image encryption scheme based-on JPEG encoding[C]//Proceedings of the Eighth International Conference on Information Visualisation, Piscataway, New Jersey, USA, 2004:217-220.
[16] Yang B, Zhou C Q, Busch C, Niu X M. Transparent and perceptually enhanced JPEG image encryption[C]//Proceeding of 16th International Conference on Digital Signal Processing, Santorini, Greece, 2009:1-6.
[17] Shreyamshakumar B K, Patil C R. JPEG image encryption using fuzzy PN sequences[J]. Signal Image Video Process, 2010, 4(4):419-427.
[18] Minemura K, Moayed Z, Wong K, Qi X, Tanaka K. JPEG image scrambling without expansion in bitstream size[C]//Proceedings of 19th IEEE International Conference on Image Processing, Orlando, Florida, USA, 2012:261-264.
[19] Macqueen J. Some methods for classification and analysis of multivariate observations[C]//Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, California, USA, 1967:281-297.
[20] The image database used in this paper is available online at http://wang.ist.psu.edu/docs/related/
Outlines

/