Skip to main content
Log in

Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a block-based transformation algorithm to achieve the purpose of image content protection. More importantly, under the proposed image content protection framework, image retrieval and image convolution can also be performed directly on the content-protected images. As a consequence, not only secure image storage and communication are accomplished, but also the computation efforts can be fully distributed, thus making it a perfect match for nowadays popular cloud computing technology. Security analyses are conducted to prove that the proposed image encryption scheme offers certain degree of security in both statistical and computational aspects. Although a higher data confidentiality may be reached by adopting traditional cryptographic encryption algorithms, we believe it could be accepted by ordinary users with general image storage needs, since extra functionalities, i.e. content-based image retrieval and image convolution, are provided. Experimental results also demonstrate the decent performance of the proposed encryption domain image retrieval and convolution with acceptable storage overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bianchi T, Piva A, Barni M (2009) Encrypted domain dct based on homomorphic cryptosystems. EURASIP J Inf Secur:1:1–1:12. doi:10.1155/2009/716357

  2. Bober M (2001) MPEG-7 Visual Shape Descriptor. IEEE Transactions on Circuits and Systems for Video Technology 11(6):716–719

    Article  Google Scholar 

  3. Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2008) A joint digital watermarking and encryption method. SPIE 6819:68191C

    MATH  Google Scholar 

  4. Cancellaro M, Battisti F, Carli M, Boato G, Natale FGBD, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12

    Article  MATH  Google Scholar 

  5. Chu KY, Kuo YH, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia, MM ’13, pp 597–600

  6. Demaine ED, Demaine ML (2007) Jigsaw puzzles, edge matching, and polyomino packing: connections and complexity. Graphs and Combinatorics 23:195–208

    Article  MathSciNet  MATH  Google Scholar 

  7. Deselaers T, Keysers D, Ney H (2008) Features for image retrieval: an experimental comparison. J Image Retr 11(2):77–107

    Google Scholar 

  8. Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 7 (2):1–20

    Article  Google Scholar 

  9. Ferguson N, Schneier B, Kohno T (2010) Cryptography engineering: design principles and practical applications. Wiley

  10. Fisher RA, Yates F (1938) Statistical tables for biological, agricultural and medical research, 3rd edn. Oliver & Boyd, London

    MATH  Google Scholar 

  11. Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:1–15

    Article  Google Scholar 

  12. Gautam A, Panwar M, Gupta P (2011) A new image encryption approach using block based transformation algorithm. Int J Adv Eng Sci Tech 8(1):90–96

    Google Scholar 

  13. Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105

    Article  MATH  Google Scholar 

  14. Hsu CY, Lu CS, Pei SC (2011) Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. SPIE 7880:788005

    Google Scholar 

  15. Huang ZC, Chan PK, Ng WY, Yeung DS (2010) Content-based image retrieval using color moment and gabor texture feature. In: Proceedings of the ninth international conference on machine learning and cybernetics, pp 719–724

  16. Jeong S, Won CS, Gary RM (2004) Image retrieval using color histograms generated by gauss mixture vector quantization. Comp Vision Image Underst 94 (1–3):44–66

    Article  Google Scholar 

  17. Jolfaei A, Mirghadri A (2010) An image encryption approach using chaos and stream cipher. J Theor Appl Inf Technol 19(2):117–125

    Google Scholar 

  18. Kelsey J, Schneier B, Ferguson N (2000) Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: Proceedings of the 6th annual international workshop on selected areas in cryptography, SAC ’99, pp 13–33

  19. Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimedia Comput Commun Appl 11(3):38:1–38:24. doi:10.1145/2656205

    Article  Google Scholar 

  20. Lathey A, Atrey PK, Joshi N (2013) Homomorphic low pass filtering on encrypted multimedia over cloud. In: ICSC. IEEE, pp 310–313

  21. Lowe DG (1999) Object recognition from local scale-invariant features. In: International conference on computer vision, pp 1150–1157

  22. Lu W, Swaminathan A, Varna AL, Wu M (2009) Enabling search over encrypted multimedia databases. In: SPIE/IS&T media forensics and security, vol 7254. SPIE, p 725418

  23. Lu W, Varna AL, Swaminathan A, Wu M (2009) Secure image retrieval through feature protection. In: IEEE conference on acoustics, speech and signal processing, pp 1533–1536

  24. Maniccam S, Bourbakis N (2001) Lossless Image Compression and Encryption using SCAN. Pattern Recognit 34:1229–1245

    Article  MATH  Google Scholar 

  25. Manjunath B, Ma W (1996) Texture features for browsing and retrieval of image data. IEEE Transactions on Pattern Analysis and Machine Intelligence 18(8):837–842

    Article  Google Scholar 

  26. Melchor CA, Fau S, Fontaine C, Gogniat G, Sirdey R (2013) Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process Mag 30(2):108–117

    Article  Google Scholar 

  27. Mitra A, Rao YVS, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. J Comput Sci 1(1):127–131

    Google Scholar 

  28. Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, CCSW ’11, pp 113–124

  29. Park M, Jin JS, Wilson LS (2002) Fast content-based image retrieval using quasi-gabor filter and reduction of image feature dimension. In: IEEE southwest symposium on image analysis and interpretation, pp 178–182

  30. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164. doi:10.1016/j.jvcir.2015.06.009

    Article  Google Scholar 

  31. Rakesh S, Ajitkumar AK, Shadakshari BC, B A (2012) Image encryption using block based uniform scrambling and chaotic logistic mapping. Int J Crypt Inf Secur (IJCIS) 2(1):49–57

    Google Scholar 

  32. Shamir A. (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  33. Sharma N, Rawat P, Singh J (2011) Efficient CBIR using color histogram processing. Signal & Image Process Int J (SIPIJ) 2(1):94–112

    Article  Google Scholar 

  34. Shih J, Chen LH (2002) Colour image retrieval based on primitives of colour moments. In: Proceedings of the 5th international conference on recent advances in visual information systems, pp 88–94

  35. Subramanyam A, Emmanuel S, Kankanhalli M (2012) Robust watermarking of compressed and encrypted jpeg2000 images. IEEE Trans Multimed 14(3):703–716. doi:10.1109/TMM.2011.2181342

    Article  Google Scholar 

  36. Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV Efficient privacy preserving video surveillance. In: ICCV. IEEE, pp 1639–1646

  37. Wang JZ, Li J, Wiederhold G (2001) Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans Pattern Anal Mach Intell 23:947–963

    Article  Google Scholar 

  38. Wang LT, McCluskey EJ (1988) Linear feedback shift register design using cyclic codes. IEEE Trans Comput 37(10):1302–1306

    Article  Google Scholar 

  39. Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82, pp 160–164

  40. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic map. Commun Nonlinear Sci Numer Simul 15 (12):3998–4006

    Article  MathSciNet  MATH  Google Scholar 

  41. Younes MAB, Jantan A (2008) An image encryption approach using a combination of permutation technique followed by encryption. Int J Comput Sci Netw Secur 8 (4):191–197

    Google Scholar 

  42. Zeng W, Lei S (2002) Efficient frequency domain selective scrambling of digital video. IEEE Trans Multimed 5:118–129

    Article  Google Scholar 

  43. Zhang X, Cheng H (2014) Histogram-based retrieval for encrypted jpeg images. In: 2014 IEEE china summit international conference on signal and information processing (ChinaSIP), pp 446–449. doi:10.1109/ChinaSIP.2014.6889282

Download references

Acknowledgments

The authors thank the anonymous reviewers’ spending valuable time reviewing and giving out useful comments. We also would like to thank Nick Leaf for proof-reading the paper and providing suggestions on how to address the reviewers’ comments. This work was supported in part by the Ministry of Science and Technology, Taiwan under the grant NSC 101-2221-E-011-150-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jia-Kai Chou.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chou, JK., Yang, CK. & Chang, HC. Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm. Multimed Tools Appl 75, 13805–13832 (2016). https://doi.org/10.1007/s11042-015-2917-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2917-6

Keywords

Navigation