[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words

Published: 15 March 2022 Publication History

Abstract

The development of cloud computing attracts enterprises and individuals to outsource their data, such as images, to the cloud server. However, direct outsourcing causes the extensive concern of privacy leakage, as images often contain rich sensitive information. A straightforward way to protect privacy is to encrypt the images using the standard cryptographic tools before outsourcing. However, in such a way the possible usage of the outsourced images would be strongly limited together with the services provided to users, like the Content-Based Image Retrieval (CBIR). In this article, we propose a secure outsourced CBIR scheme, in which an encryption scheme is designed for the widely used JPEG-format images, and the secure features can be directly extracted from such encrypted images. Specifically, the JPEG images are encrypted by the block permutation, intra-block permutation, polyalphabetic cipher, and stream cipher. Then secure local histograms are extracted from the encrypted DCT blocks and the Bag-Of-Words (BOW) model is further used to organize the encrypted local features to represent the image. The proposed image encryption gets all of the image data protected and the experimental results show that the proposed scheme achieves improved accuracy with a small file size expansion.

References

[1]
Prakhar Awasthi, Sanya Mittal, Sibeli Mukherjee, and Trupil Limbasiya. 2019. A protected cloud computation algorithm using homomorphic encryption for preserving data integrity. In Recent Findings in Intelligent Computing Techniques. Springer, 509–517.
[2]
Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, and Gwénolé Quellec. 2015. Content-based image retrieval in homomorphic encryption domain. In 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2944–2947.
[3]
Fabrice Benhamouda, Shai Halevi, and Tzipora Halevi. 2019. Supporting private data on hyperledger fabric with secure multiparty computation. IBM J. Res. Devel. 63, 2/3 (2019), 3–1.
[4]
Hang Cheng, Xinpeng Zhang, Jiang Yu, and Fengyong Li. 2016. Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016, 1 (2016), 1.
[5]
Hang Cheng, Xinpeng Zhang, Jiang Yu, and Yuan Zhang. 2016. Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Repres. 40 (2016), 111–117.
[6]
Shu-Li Cheng, Lie-Jun Wang, Gao Huang, and An-Yu Du. 2021. A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multim. Tools Applic. 80, 15 (2021), 22733–22755.
[7]
Ondrej Chum, James Philbin, Andrew Zisserman et al. 2008. Near duplicate image detection: Min-hash and TF-IDF weighting. In British Machine Vision Conference, Vol. 810. 812–815.
[8]
Bernardo Ferreira, Joao Rodrigues, Joao Leitao, and Henrique Domingos. 2017. Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7, 3 (2017), 784–798.
[9]
Qi Gu, Zhihua Xia, and Xingming Sun. 2020. MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. arXiv preprint arXiv:2007.12416.
[10]
Cheng Guo, Jing Jia, Kim-Kwang Raymond Choo, and Yingmo Jie. 2020. Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. Comput. Secur. 99 (2020), 102021.
[11]
Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 11 (2012), 4593–4607.
[12]
Lishuang Hu, Tao Xiang, and Shangwei Guo. 2020. SensIR: Towards privacy-sensitive image retrieval in the cloud. Sig. Process.: Image Commun. 84 (2020), 115837.
[13]
Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, and Kui Ren. 2016. Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25, 7 (2016), 3411–3425.
[14]
Chryssanthi Iakovidou, Nektarios Anagnostopoulos, Mathias Lux, Klitos Christodoulou, Y. Boutalis, and Savvas A. Chatzichristofis. 2019. Composite description based on salient contours and color information for CBIR tasks. IEEE Trans. Image Process. 28, 6 (2019), 3115–3129.
[15]
Kenta Iida and Hitoshi Kiya. 2020. Privacy-preserving content-based image retrieval using compressible encrypted images. IEEE Access 8 (2020), 200038–200050.
[16]
Kenta Iida and Hitoshi Kiya. 2021. A content-based image retrieval scheme using compressible encrypted images. In 28th European Signal Processing Conference (EUSIPCO). IEEE, 730–734.
[17]
T. Janani and M. Brindha. 2021. SEcure similar image matching (SESIM): An improved privacy preserving image retrieval protocol over encrypted cloud database. IEEE Trans. Multim.DOI:
[18]
Bin Li, Shilei Ding, and Xu Yang. 2021. A privacy-preserving scheme for JPEG image retrieval based on deep learning. In Journal of Physics: Conference Series, Vol. 1856. IOP Publishing, 012007.
[19]
Jia Li and James Ze Wang. 2003. Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Trans. Pattern Anal. Mach. Intell. 25, 9 (2003), 1075–1088.
[20]
Yingying Li, Jianfeng Ma, Yinbin Miao, Yue Wang, Tengfei Yang, Ximeng Liu, and Kim-Kwang Raymond Choo. 2020. Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans. Cloud Comput.DOI:
[21]
Haihua Liang, Xinpeng Zhang, and Hang Cheng. 2019. Huffman-code based retrieval for encrypted JPEG images. J. Vis. Commun. Image Repres. 61 (2019), 149–156.
[22]
Fei Liu, Yong Wang, Fan-Chuan Wang, Yong-Zheng Zhang, and Jie Lin. 2019. Intelligent and secure content-based image retrieval for mobile users. IEEE Access 7 (2019), 119209–119222.
[23]
Wenjun Lu, Ashwin Swaminathan, Avinash L. Varna, and Min Wu. 2009. Enabling search over encrypted multimedia databases. In Media Forensics and Security, Vol. 7254. International Society for Optics and Photonics, 725418.
[24]
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, and Min Wu. 2009. Secure image retrieval through feature protection. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 1533–1536.
[25]
Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, and Jiankun Hu. 2020. Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Fut. Gen. Comput. Syst. 109 (2020), 621–632.
[26]
Josef Sivic and Andrew Zisserman. 2003. Video Google: A text retrieval approach to object matching in videos. In IEEE International Conference on Computer Vision, vol. 3. IEEE Computer Society, 1470–1470.
[27]
James Ze Wang, Jia Li, and Gio Wiederhold. 2001. SIMPLIcity: Semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell. 23, 9 (2001), 947–963.
[28]
Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, and Yun Tan. 2021. A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. Multim. Syst. 27 (2021), 1–13.
[29]
Li Weng, Laurent Amsaleg, and Teddy Furon. 2016. Privacy-preserving outsourced media search. IEEE Trans. Knowl. Data Eng. 28, 10 (2016), 2738–2751.
[30]
Li Weng, Laurent Amsaleg, April Morton, and Stéphane Marchand-Maillet. 2014. A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forens. Secur. 10, 1 (2014), 152–167.
[31]
Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, and Byeungwoo Jeon. 2019. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput.DOI:
[32]
Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren. 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forens. Secur. 11, 11 (2016), 2594–2608.
[33]
Zhihua Xia, Yi Zhu, Xingming Sun, Zhan Qin, and Kui Ren. 2015. Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 6, 1 (2015), 276–286.
[34]
Yanyan Xu, Jiaying Gong, Lizhi Xiong, Zhengquan Xu, Jinwei Wang, and Yun-qing Shi. 2017. A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Repres. 43 (2017), 164–172.
[35]
Jiawei Yuan, Shucheng Yu, and Linke Guo. 2015. SEISA: Secure and efficient encrypted image search with access control. In IEEE Conference on Computer Communications (INFOCOM). IEEE, 2083–2091.
[36]
Chengyuan Zhang, Lei Zhu, Shichao Zhang, and Weiren Yu. 2020. TDHPPIR: An efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406 (2020), 386–398.
[37]
Lan Zhang, Taeho Jung, Kebin Liu, Xiang-Yang Li, Xuan Ding, Jiaxi Gu, and Yunhao Liu. 2017. PIC: Enable large-scale privacy preserving content-based image search on cloud. IEEE Trans. Parallel Distrib. Syst. 28, 11 (2017), 3258–3271.

Cited By

View all
  • (2025)High-precision privacy-protected image retrieval based on multi-feature fusionKnowledge-Based Systems10.1016/j.knosys.2025.113243(113243)Online publication date: Mar-2025
  • (2024)A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloudCybersecurity10.1186/s42400-024-00213-z7:1Online publication date: 3-Jul-2024
  • (2024)Bi-directional Block Encoding for Reversible Data Hiding over Encrypted ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363877120:5(1-23)Online publication date: 7-Feb-2024
  • Show More Cited By

Index Terms

  1. A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 3
    August 2022
    478 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3505208
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2022
    Accepted: 01 October 2021
    Revised: 01 September 2021
    Received: 01 April 2020
    Published in TOMM Volume 18, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Searchable encryption
    2. privacy-preserving image retrieval
    3. outsourced computing

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • Jiangsu Basic Research Programs-Natural Science Foundation
    • National Natural Science Foundation of China
    • Six Peak Talent project of Jiangsu Province
    • Qinglan Project of Jiangsu Province
    • “333” project of Jiangsu Province
    • Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund
    • Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China
    • BK21+ program from the Ministry of Education of Korea

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)120
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)High-precision privacy-protected image retrieval based on multi-feature fusionKnowledge-Based Systems10.1016/j.knosys.2025.113243(113243)Online publication date: Mar-2025
    • (2024)A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloudCybersecurity10.1186/s42400-024-00213-z7:1Online publication date: 3-Jul-2024
    • (2024)Bi-directional Block Encoding for Reversible Data Hiding over Encrypted ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363877120:5(1-23)Online publication date: 7-Feb-2024
    • (2024)EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud ComputingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.337066834:8(7467-7483)Online publication date: 1-Aug-2024
    • (2024)Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330196911:3(5024-5035)Online publication date: 1-Feb-2024
    • (2024)Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330104211:3(4842-4856)Online publication date: 1-Feb-2024
    • (2024)Dual-branch networks for privacy-preserving cross-modal retrieval in cloud computingThe Journal of Supercomputing10.1007/s11227-024-06643-381:1Online publication date: 5-Nov-2024
    • (2024)TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG imagesApplied Intelligence10.1007/s10489-024-05318-z54:4(3429-3447)Online publication date: 23-Feb-2024
    • (2024)Retrievable Image Encryption Based on Adaptive Block Compressed SensingProceedings of International Conference on Image, Vision and Intelligent Systems 2023 (ICIVIS 2023)10.1007/978-981-97-0855-0_4(37-51)Online publication date: 25-Feb-2024
    • (2023)Privacy-Preserving Image Retrieval Based on Disordered Local Histograms and Vision Transformer in Cloud ComputingInternational Journal of Intelligent Systems10.1155/2023/89310922023(1-16)Online publication date: 21-Sep-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media