Abstract
With the wide popularization of intelligent devices and digital imaging technology, the types and volumes of images are growing rapidly. The resource constrained data owners outsource the local data to cloud servers, where data can be stored, shared and retrieved. However, the image data may contain the user’s sensitive information, which may be exposed to the semi-trusted cloud providers and external attackers, resulting in the privacy leakage of users. Among numerous methods to solve the content-based image retrieval (CBIR) with privacy protection in cloud computing (e.g., access control, digital watermark, encryption), we mainly study the content-based encrypted image retrieval (CBEIR), which is more effective because it operates directly on the data itself. In CBEIR, some operations (e.g., feature extraction, index building) consume quite a few computing resources. In this paper, according to the trade-off of user resources, we divide the existing schemes into two categories: feature-based CBEIR schemes and image-based CBEIR schemes. For each category, its system model and common encrypted algorithms are introduced in detail. And other factors affecting these two schemes are summarized, including feature selection, feature similarity measurement methods and appropriate index structure. Finally, the future research directions are discussed and prospected.
This work was supported in part by the National Natural Science Foundation of China under Grant 61672106, and in part by the Natural Science Foundation of Beijing, China under Grant L192023 and in part by the project of Scientific research fund of Beijing Information Science and Technology University of under 5029923412.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Top 20 Valuable Facebook Statistics-Updated, September 2018. https://zephoria.com/top-15-valuable-facebook-statistics/
Abduljabbar, Z.A., Hai, J., Ibrahim, A., Hussien, Z.A., Zou, D.: Privacy-preserving image retrieval in IoT-cloud. In: 2016 IEEE Trustcom/BigDataSE/I SPA (2017)
Babenko, A., Lempitsky, V.: The inverted multi-index. IEEE Trans. Pattern Anal. Mach. Intell. 37(6), 1247–1260 (2015)
Beis, J.S., Lowe, D.G.: Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: Conference on Computer Vision & Pattern Recognition (1997)
Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), p. 2944 (2015)
Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: An end to end secure CBIR over encrypted medical database. In: Engineering in Medicine & Biology Society (2016)
Cai, Y., Zhang, S., Xia, H., Fan, Y., Zhang, H.: A privacy-preserving scheme for interactive messaging over online social networks. IEEE Internet Things J. 7(2020), 6817–6827 (2020)
Cai, Y., Zhang, H., Fang, Y.: A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks. IEEE Internet Things J. 8, 647–656 (2020)
Cheng, H., Zhang, X., Yu, J., Li, F.: Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016(1), 1–9 (2015). https://doi.org/10.1186/s13635-015-0028-6
Datar, M.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the 20th ACM Symposium on Computational Geometry (2004)
Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7(3), 784–798 (2019)
Ferreira, B., Rodrigues, J., Leito, J., Domingos, H.: Privacy-preserving content-based image retrieval in the cloud. IEEE (2014)
Furukawa, J.: Request-based comparable encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 129–146. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40203-6_8
Furukawa, J.: Short comparable encryption. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 337–352. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12280-9_22
Gong, Y., Ying, C., Guo, Y., Fang, Y.: A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 7, 1304–1313 (2017)
Guo, C., Su, S., Choo, K.K.R., Tang, X.: A fast nearest neighbor search scheme over outsourced encrypted medical images. IEEE Trans. Ind. Inform. 17(1), 514–523 (2018)
Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 601–612 (2011)
Jégou, H., Douze, M., Schmid, C.: Product quantization for nearest neighbor search. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 117–128 (2010)
Huang, K., Xu, M., Fu, S., Wang, D.: Efficient privacy-preserving content-based image retrieval in the cloud. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds.) WAIM 2016. LNCS, vol. 9659, pp. 28–39. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39958-4_3
Lan, Z., Jung, T., Feng, P., Liu, K., Liu, Y.: PIC: enable large-scale privacy preserving content-based image search on cloud. In: International Conference on Parallel Processing (2015)
Li, J.S., Liu, I.H., Tsai, C.J., Su, Z.Y., Liu, C.G.: Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access 8, 114940–114952 (2020)
Li, M., Zhang, M., Qian, W., Chow, S., Lit, C.: InstantCryptoGram: secure image retrieval service. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications (2018)
Li, Y., Ma, J., Miao, Y., Wang, Y., Choo, K.: Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans. Cloud Comput. PP(99), 1 (2020)
Lu, W., Swaminathan, A., Varna, A.L., Min, W.: Enabling search over encrypted multimedia databases. In: Media Forensics and Security I, Part of the IS&T-SPIE Electronic Imaging Symposium, Proceedings, San Jose, CA, USA, 19 January 2009 (2009)
Lu, W., Varna, A.L., Min, W.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2(2), 125–141 (2014)
Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533–1536 (2009)
Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (2009)
Parhizkar, R.: Euclidean distance matrices: properties, algorithms and applications. IEEE Signal Process. Mag. 32(6), 12–30 (2015)
Ren, K., Cong, W., Qian, W.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
Rushe, D.: Google: don’t expect privacy when sending to Gmail (2016)
Sadowski, G.C.: SimHash: hash-based similarity detection (2007)
Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020). p. S0167739X17321969
Silpa-Anan, C., Hartley, R.: Optimised KD-trees for fast image descriptor matching. In: IEEE Conference on Computer Vision & Pattern Recognition (2008)
Sivic, J.: Video Google: a text retrieval approach to object matching in videos. In: Proceedings of IEEE International Conference on Computer Vision, vol. 2 (2003)
Smith, M., Szongott, C., Henne, B., Voigt, G.V.: Big data privacy issues in public social media. In: IEEE International Conference on Digital Ecosystems Technologies (2012)
Sun, X., Xiong, N.N., Xia, Z., Vasilakos, A.V.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. Int. J. 387, 195–204 (2017)
Wang, X., Ma, J., Liu, X., Miao, Y.: Search in my way: practical outsourced image retrieval framework supporting unshared key. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (2019)
Wong, W.K., Cheung, W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data (2009)
Xia, Z., Jiang, L., Ma, X., Yang, W., Ji, P., Xiong, N.: A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial Internet of Things. IEEE Trans. Ind. Inform. 16, 629–638 (2019)
Xia, Z., Lu, L., Qin, T., Shim, H.J., Chen, X., Jeon, B.: A privacy-preserving image retrieval based on AC-coefficients and color histograms in cloud environment. Comput. Mater. Continua 58(1), 27–43 (2019)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2017)
Xia, Z., Jiang, L., Liu, D., Lu, L., Jeon, B.: BOEW: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput. 15, 202–214 (2019)
Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.Q.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164–172 (2017)
Yan, Z., Li, Z., Peng, Y., Jing, Z.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: International Conference on Digital Signal Processing (2014)
Zhang, Y., Xinpeng, J., Cheng, H.: Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40, 111–117 (2016)
Zhang, S., Cai, Y., Xia, H.: A privacy-preserving interactive messaging scheme based on users credibility over online social networks (2017)
Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89(C), 1–12 (2016)
Zhu, Y., Wang, Z., Zhang, Y.: Secure k-NN query on encrypted cloud data with limited key-disclosure and offline data owner. In: Bailey, J., Khan, L., Washio, T., Dobbie, G., Huang, J.Z., Wang, R. (eds.) PAKDD 2016. LNCS (LNAI), vol. 9652, pp. 401–414. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31750-2_32
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, M., Cai, Y., Zhang, Y., Li, X., Fan, Y. (2022). A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_24
Download citation
DOI: https://doi.org/10.1007/978-981-19-0852-1_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0851-4
Online ISBN: 978-981-19-0852-1
eBook Packages: Computer ScienceComputer Science (R0)