Abstract
This paper proposes a novel retrieval scheme for encrypted JPEG images. With this scheme, the DC and AC coefficients of JPEG images are encrypted using a stream cipher and scrambling encryption, respectively. Then, the encrypted images are transmitted to and stored in a server, which can also provide retrieval service. When receiving an encrypted query image, the server without any knowledge of the plaintext content may acquire statistically its AC coefficients histogram. By calculating the distances between the histograms of encrypted query image and database image, the server may output the encrypted images closest to the query image to the authorized user.
Similar content being viewed by others
Notes
Freely available at http://wang.ist.psu.edu/docs/related/
References
Boneh D, Di Crescenzo G, Ostrovsky R et al (2004) Public-key encryption with keyword search. Adv Cryptol-Eurocrypt 2004:506–522
Cao N, Wang C, Li M et al (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib Syst IEEE Trans 25:222–233
Curtmola R, Garay J, Kamara S et al (2006) Searchable symmetric encryption: improved definitions and efficient constructions. Proceedings of the 13th ACM conference on Computer and Communications Security, 79–88
Erkin Z, Franz M, Guajardo J et al (2009) Privacy-preserving face recognition. Privacy Enhancing Technologies, 235–253
Fanti G, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30:53–61
Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive, 216
Int. Telecommunication Union, CCITT Recommendation T.81, Information Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines 1992
Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. Financial Cryptography and Data Security, 258–274
Li J, Wang Q, Wang C et al (2010) Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of INFOCOM 2010, 1–5
Lu W, Swaminathan A, Varna AL et al (2009) Enabling Search over Encrypted Multimedia Databases. IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 725418–725418
Lu W, Varna AL, Swaminathan A et al (2009) Secure Image Retrieval through Feature Protection. Proc. of the 2009 I.E. International Conference on Acoustics, Speech and Signal Processing, 1533–1536
Lu W, Varna A, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. Access IEEE 2:125–141
Qian Z, Zhang X, Ren Y (2015) JPEG encryption for image rescaling in the encrypted domain. J Vis Commun Image Represent 26:9–13
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimedia 16:1486–1491
Ra M R, Govindan R, and Ortega A (2013) P3: Toward privacy-preserving photo sharing. NSDI. 515–528
Shashank J, Kowshik P, Srinathan K et al (2008) Private content based image retrieval. Computer Vision and Pattern Recognition, 2008, CVPR 2008, IEEE conference on, 1–8
Shi E, Bethencourt J, Chan TH et al (2007) Multi-dimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, 2007 (SP’07), 350–364
Song D X, Wagner D, and Perrig A (2000) Practical techniques for searches in encrypted data. IEEE Symposium on Research in Security and Privacy, 44–55
Sudharsanan S (2005) Shared key encryption of JPEG color images. Consum Electron IEEE Trans 51:1204–1211
Wang C, Cao N, Li J et al (2010) Secure ranked keyword search over encrypted cloud data. In IEEE 30th International Conference on Distributed Computing Systems, 253–262
Wang C, Ren K, Yu S, et al (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM, 2012 Proceedings IEEE, 451–459
Zhang X and Cheng H (2014) Histogram-based retrieval for encrypted JPEG images. Signal and Information Processing (ChinaSIP), 2014 I.E. China Summit & International Conference on, 446–449
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grants 61472235, 61373151, 61272043 and 61202367, the Research Fund for the Doctoral Program of Higher Education of China under Grant 20113108110010, the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Shanghai Pujiang Program under Grant 13PJ1403200.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cheng, H., Zhang, X. & Yu, J. AC-coefficient histogram-based retrieval for encrypted JPEG images. Multimed Tools Appl 75, 13791–13803 (2016). https://doi.org/10.1007/s11042-015-2741-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2741-z