Abstract
In recent years, information leakage incidents occur frequently. Ciphertext domain search has become a hot spot in multimedia technology and software engineering. Therefore, how to mine valuable information safely and effectively is very important. In this paper, we present the CBIR solution and complete the relevant software development. The proposed method not only outsources CBIR services but also avoids privacy leaks. Our main contributions are reflected in two aspects: improving search efficiency and protecting user privacy. For one thing, we propose a novel privacy protection algorithm to encrypt images. For the other thing, we propose an integrated deep hash algorithm to extract the high-level features of images. In the index encryption process, we use secure kNN to encrypt the index. Through experimental analysis and argumentation, the proposed privacy protection algorithm has a lower correlation coefficient and a better information entropy. It is secure enough and can resist common types of attacks encountered during data transmission. The proposed secure image retrieval algorithm is tested on two datasets. Compared with the same type of algorithm, the proposed algorithm has better retrieval performance. In short, the privacy reservation scheme guarantees the security and effectiveness of the system.
Similar content being viewed by others
References
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 2017:197–213
Chunsheng G, Jixing G (2014) Known-plaintext attack on secure kNN computation on encrypted databases[J]. Secur Commun Netw 7(12):2432–2441
Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation diffusion technique. Opt Lasers Eng 90:146–154
Fan K, Wang X, Suto K et al (2018) Secure and efficient privacy-preserving Ciphertext retrieval in connected vehicular cloud computing. IEEE Netw 32(3):52–57
Ferreira B, Rodrigues J, Leitao J et al (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 99:1–1
Gao H, Zhuang L, Maaten LVD, et al (2017) Densely connected convolutional networks. In: CVPR
Gionis A, Indyk P, Motwani R (1999) Similarity search in high dimensions via hashing. In: VLDB 99(6):518–529
Gui J, Liu T, Sun Z et al (2018) Fast supervised discrete hashing. IEEE Trans Pattern Anal Mach Intell 40(2):490–496
Gupta R, Jain A (2018) A new image encryption algorithm based on DNA approach. Int J Comput Appl 85(18):27–31
He K, Zhang X, Ren S, et al (2016) Deep residual learning for image recognition. In: CVPR
Ibrahim A, Jin H, Yassin AA et al (2018) Towards efficient yet privacy-preserving approximate search in cloud computing. Comput J 57(2):241–254
Kaur M, Kumar V (2018) Efficient image encryption method based on improved Lorenz chaotic system. Electron Lett 55(9):562–564
Khan JS, Ahmad J (2018) Chaos based efficient selective image encryption. Multidim Syst Sign Process 2018:1–19
Li X, Zhou C, Huang L (2018) A secure and efficient image encryption algorithm based on DNA coding. Comput Appl Softw 20(1):110–120
Liu W, Wang J, Ji R, et al (2012) Supervised hashing with kernels. In: Proceedings of Computer Vision and Pattern Recognition (CVPR) 2012:2074–2081
Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466
Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36
Liu L, Hao S, Lin J et al (2018) Image block encryption algorithm based on chaotic maps. IET Signal Proc 12(1):22–30
Niu H, Zhou C, Wang B, Zheng X, Zhou S (2016) Splicing model and hyper–chaotic system for image encryption. J Electr Eng 67(2):78–86
Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Comput Sci 2018:165–171
Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharaja R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184
Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677
Shen J, Zhou T, Chen X et al (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: ICLR
Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60
Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 2015:53–61
Weiss Y, Torralba A, Fergus R (2009, 2009) Spectral hashing. Adv Neural Inf Proces Syst:1753–1760
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. IEEE J Sel Areas Telecommun 2:31–38
Xia Z, Zhu Y, Sun X et al (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 99:1–1
Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78(21):17–25
Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):1–23
Zhang Q, Wei X (2014) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299
Zhang L, Jung T, Feng P, et al (2015) PIC: enable large-scale privacy preserving content-based image search on cloud. International Conference on Parallel Processing IEEE 2015:1–1
Zhu Z, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Acknowledgements
This work was supported by the National Natural Science Foundation (No. 61771416), the Higher Education Innovation Research Group (No. XJEDU2017T002), and the CERNET Innovation Project (No. NGII20170325 & NGII20180201).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Cheng, SL., Wang, LJ., Huang, G. et al. A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 80, 22733–22755 (2021). https://doi.org/10.1007/s11042-019-07753-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07753-4