Skip to main content
Log in

A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, information leakage incidents occur frequently. Ciphertext domain search has become a hot spot in multimedia technology and software engineering. Therefore, how to mine valuable information safely and effectively is very important. In this paper, we present the CBIR solution and complete the relevant software development. The proposed method not only outsources CBIR services but also avoids privacy leaks. Our main contributions are reflected in two aspects: improving search efficiency and protecting user privacy. For one thing, we propose a novel privacy protection algorithm to encrypt images. For the other thing, we propose an integrated deep hash algorithm to extract the high-level features of images. In the index encryption process, we use secure kNN to encrypt the index. Through experimental analysis and argumentation, the proposed privacy protection algorithm has a lower correlation coefficient and a better information entropy. It is secure enough and can resist common types of attacks encountered during data transmission. The proposed secure image retrieval algorithm is tested on two datasets. Compared with the same type of algorithm, the proposed algorithm has better retrieval performance. In short, the privacy reservation scheme guarantees the security and effectiveness of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 2017:197–213

    Article  Google Scholar 

  2. Chunsheng G, Jixing G (2014) Known-plaintext attack on secure kNN computation on encrypted databases[J]. Secur Commun Netw 7(12):2432–2441

    Article  Google Scholar 

  3. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation diffusion technique. Opt Lasers Eng 90:146–154

    Article  Google Scholar 

  4. Fan K, Wang X, Suto K et al (2018) Secure and efficient privacy-preserving Ciphertext retrieval in connected vehicular cloud computing. IEEE Netw 32(3):52–57

    Article  Google Scholar 

  5. Ferreira B, Rodrigues J, Leitao J et al (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 99:1–1

    Google Scholar 

  6. Gao H, Zhuang L, Maaten LVD, et al (2017) Densely connected convolutional networks. In: CVPR

  7. Gionis A, Indyk P, Motwani R (1999) Similarity search in high dimensions via hashing. In: VLDB 99(6):518–529

  8. Gui J, Liu T, Sun Z et al (2018) Fast supervised discrete hashing. IEEE Trans Pattern Anal Mach Intell 40(2):490–496

    Article  Google Scholar 

  9. Gupta R, Jain A (2018) A new image encryption algorithm based on DNA approach. Int J Comput Appl 85(18):27–31

    Google Scholar 

  10. He K, Zhang X, Ren S, et al (2016) Deep residual learning for image recognition. In: CVPR

  11. Ibrahim A, Jin H, Yassin AA et al (2018) Towards efficient yet privacy-preserving approximate search in cloud computing. Comput J 57(2):241–254

    Article  Google Scholar 

  12. Kaur M, Kumar V (2018) Efficient image encryption method based on improved Lorenz chaotic system. Electron Lett 55(9):562–564

    Article  Google Scholar 

  13. Khan JS, Ahmad J (2018) Chaos based efficient selective image encryption. Multidim Syst Sign Process 2018:1–19

    Google Scholar 

  14. Li X, Zhou C, Huang L (2018) A secure and efficient image encryption algorithm based on DNA coding. Comput Appl Softw 20(1):110–120

    Google Scholar 

  15. Liu W, Wang J, Ji R, et al (2012) Supervised hashing with kernels. In: Proceedings of Computer Vision and Pattern Recognition (CVPR) 2012:2074–2081

  16. Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  17. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  18. Liu L, Hao S, Lin J et al (2018) Image block encryption algorithm based on chaotic maps. IET Signal Proc 12(1):22–30

    Article  Google Scholar 

  19. Niu H, Zhou C, Wang B, Zheng X, Zhou S (2016) Splicing model and hyper–chaotic system for image encryption. J Electr Eng 67(2):78–86

    Google Scholar 

  20. Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Comput Sci 2018:165–171

    Article  Google Scholar 

  21. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharaja R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  22. Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  23. Shen J, Zhou T, Chen X et al (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925

    Article  Google Scholar 

  24. Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: ICLR

  25. Wang X, Zhang H (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60

    Article  Google Scholar 

  26. Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149

    Article  MathSciNet  Google Scholar 

  27. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 2015:53–61

    Article  Google Scholar 

  28. Weiss Y, Torralba A, Fergus R (2009, 2009) Spectral hashing. Adv Neural Inf Proces Syst:1753–1760

  29. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. IEEE J Sel Areas Telecommun 2:31–38

    Google Scholar 

  30. Xia Z, Zhu Y, Sun X et al (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 99:1–1

    Google Scholar 

  31. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78(21):17–25

    Article  Google Scholar 

  32. Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):1–23

    Google Scholar 

  33. Zhang Q, Wei X (2014) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Google Scholar 

  34. Zhang L, Jung T, Feng P, et al (2015) PIC: enable large-scale privacy preserving content-based image search on cloud. International Conference on Parallel Processing IEEE 2015:1–1

  35. Zhu Z, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation (No. 61771416), the Higher Education Innovation Research Group (No. XJEDU2017T002), and the CERNET Innovation Project (No. NGII20170325 & NGII20180201).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lie-Jun Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, SL., Wang, LJ., Huang, G. et al. A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 80, 22733–22755 (2021). https://doi.org/10.1007/s11042-019-07753-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07753-4

Keywords

Navigation