Abstract
In this paper we introduce a new secure cryptographic scheme, named IES-CBIR, specifically designed for images and their outsourced storage and retrieval in large private image repositories. Our solution enables both encrypted storage and querying using Content Based Image Retrieval (CBIR), while preserving privacy. We have implemented a prototype system around the proposed scheme, and experimentally analyzed its performance when compared to similar proposals for privacy-preserving image retrieval. Our results show that IES-CBIR allows more efficient operations than existing proposals, both in terms of time and space overheads, while enabling less restrictive application scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Global Web Index: Instagram tops the list of social network growth (2013). http://blog.globalwebindex.net/instagram-tops-list-of-growth
Rushe, D.: Google: don’t expect privacy when sending to Gmail. The Guardian (2013). http://tinyurl.com/kjga34x
Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. The Guardian (2013). http://tinyurl.com/oea3g8t
Chen, A.: GCreep: Google Engineer Stalked Teens, Spied on Chats. Gawker (2010). http://gawker.com/5637234
Halderman, J., Schoen, S.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)
Mahajan, P., et al.: Depot: cloud storage with minimal trust. ACM Trans. Comput. Syst. 29(4), 1–38 (2011)
Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850–867. Springer, Heidelberg (2012)
Hsu, C.Y., et al.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593–4607 (2012)
Lu, W., et al.: Enabling search over encrypted multimedia databases. In: IS&T/SPIE Electron. Imaging, ISOP, February 2009. 725418–725418-11
Song, D.X., et al.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44–55. IEEE (2000)
Agrawal, R., et al.: Order preserving encryption for numeric data. In: Proceedings SIGMOD, pp. 563–574. ACM (2004)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
El Gamal, Taher: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, David (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Swain, M.J., Ballard, D.H.: Color indexing. Int. J. Comput. Vis. 7(1), 11–32 (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ferreira, B., Rodrigues, J., Leitão, J., Domingos, H. (2015). Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties. In: Garcia-Alfaro, J., et al. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. DPM QASA SETOP 2014 2014 2014. Lecture Notes in Computer Science(), vol 8872. Springer, Cham. https://doi.org/10.1007/978-3-319-17016-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-17016-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17015-2
Online ISBN: 978-3-319-17016-9
eBook Packages: Computer ScienceComputer Science (R0)