Skip to main content
Log in

Secure content based image retrieval system using deep learning with multi share creation scheme in cloud environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, secure image archival and retrieval model in cloud computing (CC) received significant attention to ensure data confidentiality and secured data transmission among cloud server and clients cloud storage and users. Traditional secure image retrieval (IR) techniques are not applicable to adapt with a large-scale IR in cloud environment. In order to overcome these issues, this article introduces an effective secure IR scheme using Inception with ResNet v2 (SIRS-IR) and Multiple Share Creation (MSC) scheme. The proposed method uses Inception with ResNet v2 model based feature extraction process. At the same time, the MSC process is utilized for multiple share generation and then encryption of shares takes place using double chaotic logistic map (DLCM) technique. Besides, the encrypted shares and the respective feature vectors are saved in the cloud server with the corresponding image identification number. During the IR process for the applied QI, the SIRS-IR model extracts the feature vectors and performs similarity measurement to retrieve the related images from the database interms of encrypted shares. Finally, the share decryption process is carried out for the reconstruction of original images with no loss of quality. Extensive experimentations were performed to verify the retrieval performance and image quality of the reconstructed images using Corel10K dataset. The obtained results stated that the presented SIRS-IR model is found to be superior to other methods in a considerable way.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security standardisation research. SSR 2014. Lecture notes in computer science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_10

  2. Alsmadi MK (2017) An efficient similarity measure for content based image retrieval using memetic algorithm. Egypt J Basic Appl Sci 4(2):112–122

    Google Scholar 

  3. Alsmadi MK (2018) Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm. J King Saud Univ Comput Inf Sci 30(3):373–381

    Google Scholar 

  4. Cheng SL, Wang LJ, Huang G, Du AY (2019) A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 25:1–23

  5. Du A, Wang L, Cheng S, Ao N (2020) A privacy-protected image retrieval scheme for fast and secure image search. Symmetry 12(2):282

    Article  Google Scholar 

  6. ElAlami ME (2011) A novel image retrieval model based on the most relevant features. Knowl Based Syst 24(1):23–32

    Article  Google Scholar 

  7. Elhoseny M, Shankar K, Lakshmanaprabu SK et al (2020) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 32:10979–10993. https://doi.org/10.1007/s00521-018-3801-x

  8. Ferreira B, Rodrigues J, Leitao J, Domingos H (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 7(3):784–798

  9. Geetha P, Jayanthi VS, Jayanthi AN (2019) Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. Multimed Tools Appl 78(13):18503–18530

    Article  Google Scholar 

  10. Gu Q, Xia Z, Sun X, Weng J (2020) MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. arXiv preprint arXiv:2007.12416

  11. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. IEEE Comput Soc Conf Comput Vis Pattern Recogn :770–778

  12. Jhanwar N, Chaudhuri S, Seetharaman G, Zavidovique B (2004) Content based image retrieval using motif cooccurrence matrix. Image Vis Comput 22(14):1211–1220

    Article  Google Scholar 

  13. Kouzehgar M, Tamilselvam YK, Heredia MV, Elara MR (2019) Self-reconfigurable façade-cleaning robot equipped with deep-learning-based crack detection based on convolutional neural networks. Autom Constr 108:102959

    Article  Google Scholar 

  14. Li M, Zhang M, Wang Q, Chow SS, Du M, Chen Y, Lit C, 2018, April. InstantCryptoGram: Secure image retrieval service. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications (pp. 2222–2230). IEEE, New York

  15. Lin CH, Chen RT, Chan YK (2009) A smart content-based image retrieval system based on color and texture feature. Image Vis Comput 27(6):658–665

    Article  Google Scholar 

  16. Madhavi KV, Tamilkodi R, Sudha KJ (2016) An innovative method for retrieving relevant images by getting the top-ranked images first using interactive genetic algorithm. Procedia Comput Sci 79:254–261

    Article  Google Scholar 

  17. Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 2018(1):142

    Article  Google Scholar 

  18. Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Futur Gener Comput Syst 111:213–225

  19. Pavithra LK, Sharmila TS (2018) An efficient framework for image retrieval using color, texture and edge features. Comput Electr Eng 70:580–593

    Article  Google Scholar 

  20. Rahim N, Ahmad J, Muhammad K, Sangaiah AK, Baik SW (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75–85

    Article  Google Scholar 

  21. Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118–130

    Article  Google Scholar 

  22. Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2014) Going deeper with convolutions. arXiv 2014. arXiv preprint arXiv:1409.4842, 1409

  23. Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, Inception-Resnet and the Impact of Residual Connections on Learning, Thirty-First AAAI Conference on Artificial Intelligence

  24. Wang H, Xia Z, Fei J, Xiao F (2020) An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing. IEEE Access 8:61138–61147

  25. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  26. Xia Z, Ma X, Shen Z, Sun X, Xiong NN, Jeon B (2018) Secure image LBP feature extraction in cloud-based smart campus. IEEE Access 6:30392–30401

    Article  Google Scholar 

  27. Xu Y, Zhao X, Gong J (2019) A large-scale secure image retrieval method in cloud environment. IEEE Access 7:160082–160090

    Article  Google Scholar 

  28. Youssef SM (2012) ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval. Comput Electr Eng 38(5):1358–1376

    Article  Google Scholar 

  29. Yuan BH, Liu GH (2020) Image retrieval based on gradient-structures histogram. Neural Comput Appl 32(15):11717–11727

  30. Zhang C, Zhu L, Zhang S, Yu W (2020) TDHPPIR: an efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406:386–398

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Uthayakumar.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Punithavathi, R., Ramalingam, A., Kurangi, C. et al. Secure content based image retrieval system using deep learning with multi share creation scheme in cloud environment. Multimed Tools Appl 80, 26889–26910 (2021). https://doi.org/10.1007/s11042-021-10998-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10998-7

Keywords

Navigation