Skip to main content

A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Included in the following conference series:

Abstract

With the wide popularization of intelligent devices and digital imaging technology, the types and volumes of images are growing rapidly. The resource constrained data owners outsource the local data to cloud servers, where data can be stored, shared and retrieved. However, the image data may contain the user’s sensitive information, which may be exposed to the semi-trusted cloud providers and external attackers, resulting in the privacy leakage of users. Among numerous methods to solve the content-based image retrieval (CBIR) with privacy protection in cloud computing (e.g., access control, digital watermark, encryption), we mainly study the content-based encrypted image retrieval (CBEIR), which is more effective because it operates directly on the data itself. In CBEIR, some operations (e.g., feature extraction, index building) consume quite a few computing resources. In this paper, according to the trade-off of user resources, we divide the existing schemes into two categories: feature-based CBEIR schemes and image-based CBEIR schemes. For each category, its system model and common encrypted algorithms are introduced in detail. And other factors affecting these two schemes are summarized, including feature selection, feature similarity measurement methods and appropriate index structure. Finally, the future research directions are discussed and prospected.

This work was supported in part by the National Natural Science Foundation of China under Grant 61672106, and in part by the Natural Science Foundation of Beijing, China under Grant L192023 and in part by the project of Scientific research fund of Beijing Information Science and Technology University of under 5029923412.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Top 20 Valuable Facebook Statistics-Updated, September 2018. https://zephoria.com/top-15-valuable-facebook-statistics/

  2. Abduljabbar, Z.A., Hai, J., Ibrahim, A., Hussien, Z.A., Zou, D.: Privacy-preserving image retrieval in IoT-cloud. In: 2016 IEEE Trustcom/BigDataSE/I SPA (2017)

    Google Scholar 

  3. Babenko, A., Lempitsky, V.: The inverted multi-index. IEEE Trans. Pattern Anal. Mach. Intell. 37(6), 1247–1260 (2015)

    Article  Google Scholar 

  4. Beis, J.S., Lowe, D.G.: Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: Conference on Computer Vision & Pattern Recognition (1997)

    Google Scholar 

  5. Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), p. 2944 (2015)

    Google Scholar 

  6. Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: An end to end secure CBIR over encrypted medical database. In: Engineering in Medicine & Biology Society (2016)

    Google Scholar 

  7. Cai, Y., Zhang, S., Xia, H., Fan, Y., Zhang, H.: A privacy-preserving scheme for interactive messaging over online social networks. IEEE Internet Things J. 7(2020), 6817–6827 (2020)

    Article  Google Scholar 

  8. Cai, Y., Zhang, H., Fang, Y.: A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks. IEEE Internet Things J. 8, 647–656 (2020)

    Article  Google Scholar 

  9. Cheng, H., Zhang, X., Yu, J., Li, F.: Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016(1), 1–9 (2015). https://doi.org/10.1186/s13635-015-0028-6

    Article  Google Scholar 

  10. Datar, M.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the 20th ACM Symposium on Computational Geometry (2004)

    Google Scholar 

  11. Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7(3), 784–798 (2019)

    Article  Google Scholar 

  12. Ferreira, B., Rodrigues, J., Leito, J., Domingos, H.: Privacy-preserving content-based image retrieval in the cloud. IEEE (2014)

    Google Scholar 

  13. Furukawa, J.: Request-based comparable encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 129–146. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40203-6_8

    Chapter  Google Scholar 

  14. Furukawa, J.: Short comparable encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 337–352. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12280-9_22

    Chapter  Google Scholar 

  15. Gong, Y., Ying, C., Guo, Y., Fang, Y.: A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 7, 1304–1313 (2017)

    Article  Google Scholar 

  16. Guo, C., Su, S., Choo, K.K.R., Tang, X.: A fast nearest neighbor search scheme over outsourced encrypted medical images. IEEE Trans. Ind. Inform. 17(1), 514–523 (2018)

    Article  Google Scholar 

  17. Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)

    Article  MathSciNet  Google Scholar 

  18. Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 601–612 (2011)

    Google Scholar 

  19. Jégou, H., Douze, M., Schmid, C.: Product quantization for nearest neighbor search. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 117–128 (2010)

    Article  Google Scholar 

  20. Huang, K., Xu, M., Fu, S., Wang, D.: Efficient privacy-preserving content-based image retrieval in the cloud. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds.) WAIM 2016. LNCS, vol. 9659, pp. 28–39. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39958-4_3

    Chapter  Google Scholar 

  21. Lan, Z., Jung, T., Feng, P., Liu, K., Liu, Y.: PIC: enable large-scale privacy preserving content-based image search on cloud. In: International Conference on Parallel Processing (2015)

    Google Scholar 

  22. Li, J.S., Liu, I.H., Tsai, C.J., Su, Z.Y., Liu, C.G.: Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access 8, 114940–114952 (2020)

    Article  Google Scholar 

  23. Li, M., Zhang, M., Qian, W., Chow, S., Lit, C.: InstantCryptoGram: secure image retrieval service. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications (2018)

    Google Scholar 

  24. Li, Y., Ma, J., Miao, Y., Wang, Y., Choo, K.: Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans. Cloud Comput. PP(99), 1 (2020)

    Google Scholar 

  25. Lu, W., Swaminathan, A., Varna, A.L., Min, W.: Enabling search over encrypted multimedia databases. In: Media Forensics and Security I, Part of the IS&T-SPIE Electronic Imaging Symposium, Proceedings, San Jose, CA, USA, 19 January 2009 (2009)

    Google Scholar 

  26. Lu, W., Varna, A.L., Min, W.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2(2), 125–141 (2014)

    Google Scholar 

  27. Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533–1536 (2009)

    Google Scholar 

  28. Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (2009)

    Google Scholar 

  29. Parhizkar, R.: Euclidean distance matrices: properties, algorithms and applications. IEEE Signal Process. Mag. 32(6), 12–30 (2015)

    Article  Google Scholar 

  30. Ren, K., Cong, W., Qian, W.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)

    Article  Google Scholar 

  31. Rushe, D.: Google: don’t expect privacy when sending to Gmail (2016)

    Google Scholar 

  32. Sadowski, G.C.: SimHash: hash-based similarity detection (2007)

    Google Scholar 

  33. Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020). p. S0167739X17321969

    Google Scholar 

  34. Silpa-Anan, C., Hartley, R.: Optimised KD-trees for fast image descriptor matching. In: IEEE Conference on Computer Vision & Pattern Recognition (2008)

    Google Scholar 

  35. Sivic, J.: Video Google: a text retrieval approach to object matching in videos. In: Proceedings of IEEE International Conference on Computer Vision, vol. 2 (2003)

    Google Scholar 

  36. Smith, M., Szongott, C., Henne, B., Voigt, G.V.: Big data privacy issues in public social media. In: IEEE International Conference on Digital Ecosystems Technologies (2012)

    Google Scholar 

  37. Sun, X., Xiong, N.N., Xia, Z., Vasilakos, A.V.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. Int. J. 387, 195–204 (2017)

    Google Scholar 

  38. Wang, X., Ma, J., Liu, X., Miao, Y.: Search in my way: practical outsourced image retrieval framework supporting unshared key. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (2019)

    Google Scholar 

  39. Wong, W.K., Cheung, W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data (2009)

    Google Scholar 

  40. Xia, Z., Jiang, L., Ma, X., Yang, W., Ji, P., Xiong, N.: A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial Internet of Things. IEEE Trans. Ind. Inform. 16, 629–638 (2019)

    Article  Google Scholar 

  41. Xia, Z., Lu, L., Qin, T., Shim, H.J., Chen, X., Jeon, B.: A privacy-preserving image retrieval based on AC-coefficients and color histograms in cloud environment. Comput. Mater. Continua 58(1), 27–43 (2019)

    Article  Google Scholar 

  42. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2017)

    Article  Google Scholar 

  43. Xia, Z., Jiang, L., Liu, D., Lu, L., Jeon, B.: BOEW: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 15, 202–214 (2019)

    Article  Google Scholar 

  44. Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.Q.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164–172 (2017)

    Article  Google Scholar 

  45. Yan, Z., Li, Z., Peng, Y., Jing, Z.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: International Conference on Digital Signal Processing (2014)

    Google Scholar 

  46. Zhang, Y., Xinpeng, J., Cheng, H.: Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40, 111–117 (2016)

    Article  Google Scholar 

  47. Zhang, S., Cai, Y., Xia, H.: A privacy-preserving interactive messaging scheme based on users credibility over online social networks (2017)

    Google Scholar 

  48. Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89(C), 1–12 (2016)

    Article  Google Scholar 

  49. Zhu, Y., Wang, Z., Zhang, Y.: Secure k-NN query on encrypted cloud data with limited key-disclosure and offline data owner. In: Bailey, J., Khan, L., Washio, T., Dobbie, G., Huang, J.Z., Wang, R. (eds.) PAKDD 2016. LNCS (LNAI), vol. 9652, pp. 401–414. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31750-2_32

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Cai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, M., Cai, Y., Zhang, Y., Li, X., Fan, Y. (2022). A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics