Cover
Vol. 18 No. 2 (2022)

Published: December 31, 2022

Pages: 60-68

Original Article

Privacy-Preserve Content-Based Image Retrieval Using Aggregated Local Features

Abstract

Due to the recent improvements in imaging and computing technologies, a massive quantity of image data is generated every day. For searching image collection, several content-based image retrieval (CBIR) methods have been introduced. However, these methods need more computing and storage resources. Cloud servers can fill this gap by providing huge computational power at a cheap price. However, cloud servers are not fully trusted, thus image owners have legal concerns about the privacy of their private data. In this paper, we proposed and implemented a privacy-preserving CBIR (PP-CBIR) scheme that allows searching and retrieving image databases in a cipher text format. Specifically, we extract aggregated feature vectors to represent the corresponding image collection and employ the asymmetric scalar-product-preserving encryption scheme (ASPE) method to protect these vectors while allowing for similarity computation between these encrypted vectors. To enhance search time, all encrypted features are clustered by the k-means algorithm recursively to construct a tree index. Results show that PP-CBIR has faster indexing and retrieving with good retrieval precision and scalability than previous schemes.

References

  1. Y. Mingqiang, K. Kidiyo, and R. Joseph, “A survey of shape feature extraction techniques,” Pattern recognition, vol. 15, no. 7, pp. 43-90, 2008.
  2. H. Al-Jubouri, and H. Du, “A Content-Based Image Retrieval Method By Exploiting Cluster Shapes,” Iraqi Journal for Electrical & Electronic Engineering, vol. 14, no. 2, 2018.
  3. J. R. Smith, and S.-F. Chang, "Tools and techniques for color image retrieval", Electronic Imaging, pp. 426-437, 1993. DOI:10.1117/12.234781
  4. B. S. Manjunath, and W.-Y. Ma, “Texture features for browsing and retrieval of image data,” IEEE Transactions on pattern analysis and machine intelligence, vol. 18, no. 8, pp. 837-842, 1996.
  5. S. K. Abdulateef, and M. D. Salman, “A Comprehensive Review of Image Segmentation Techniques,” Iraqi Journal for Electrical & Electronic Engineering, vol. 17, no. 2, 2021.
  6. D. G. Lowe, “Distinctive image features from scale- invariant keypoints,” International journal of computer vision, vol. 60, no. 2, pp. 91-110, 2004.
  7. H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-up robust features (SURF),” Computer vision and image understanding, vol. 110, no. 3, pp. 346-359, 2008.
  8. E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, "ORB: An efficient alternative to SIFT or SURF", 2011 International Conference on Computer Vision. pp. 2564- 2571, 2011.
  9. T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971-987, 2002.
  10. H. Jégou, M. Douze, C. Schmid, and P. Pérez, "Aggregating local descriptors into a compact image representation", 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 3304-3311, 2010.
  11. W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases", Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152, 2009. DOI: 10.1145/1559845.1559862
  12. Z. A. Abduljabbar, A. Ibrahim, M. A. Hussain, Z. A. Hussien, M. A. Al Sibahee, and S. Lu, “EEIRI: efficient encrypted image retrieval in IoT-cloud,” KSII Transactions on Internet and Information Systems (TIIS), vol. 13, no. 11, pp. 5692-5716, 2019.
  13. W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, "Enabling search over encrypted multimedia databases", Proceedings Volume 7254, Media Forensics and Security, 725418, 2009. DOI:10.1117/12.806980
  14. W. Lu, A. L. Varna, A. Swaminathan, and M. Wu, "Secure image retrieval through feature protection", 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533-1536, 2009.
  15. L. Zhang, T. Jung, K. Liu, X.-Y. Li, X. Ding, J. Gu, and Y. Liu, “Pic: Enable large-scale privacy preserving content-based image search on cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 11, pp. 3258-3271, 2017.
  16. W. Lu, A. L. Varna, and M. Wu, “Confidentiality- preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization,” IEEE Access, vol. 2, pp. 125-141, 2014.
  17. A. I. Abdulsada, A. N. M. Ali, Z. A. Abduljabbar, and H. S. Hashim, “Secure image retrieval over untrusted cloud servers,” International Journal of Engineering and Advanced Technology, vol. 3, no. 1, pp. 140-147, 2013.
  18. J. Qin, H. Li, X. Xiang, Y. Tan, W. Pan, W. Ma, and N. N. Xiong, “An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing,” IEEE Access, vol. 7, pp. 24626-24633, 2019.
  19. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing,” IEEE transactions on information forensics and security, vol. 11, no. 11, pp. 2594-2608, 2016.
  20. Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, “Towards privacy-preserving content-based image retrieval in cloud computing,” IEEE Transactions on Cloud Computing, vol. 6, no. 1, pp. 276-286, 2015.
  21. H. Cheng, X. Zhang, J. Yu, and Y. Zhang, “Encrypted JPEG image retrieval using block-wise feature comparison,” Journal of Visual Communication and Image Representation, vol. 40, pp. 111-117, 2016.
  22. H. Cheng, X. Zhang, J. Yu, and F. Li, “Markov process- based retrieval for encrypted JPEG images,” EURASIP Journal on Information Security, vol. 2016, no. 1, pp. 1-9, 2016.
  23. B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, "Privacy-preserving content-based image retrieval in the cloud", 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp. 11-20, 2015.
  24. B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Practical privacy-preserving content-based retrieval in cloud image repositories,” IEEE Transactions on Cloud Computing, vol. 7, no. 3, pp. 784-798, 2017.
  25. H. Wang, Z. Xia, J. Fei, and F. Xiao, “An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing,” IEEE Access, vol. 8, pp. 61138-61147, 2020.
  26. Z. Xia, L. Lu, T. Qin, H. Shim, X. Chen, and B. Jeon, “A privacy-preserving image retrieval based on AC- coefficients and color histograms in cloud environment,” CMC-COMPUTERS MATERIALS & CONTINUA, vol. 58, no. 1, pp. 27-43, 2019.
  27. Z. Xia, L. Jiang, D. Liu, L. Lu, and B. Jeon, “BOEW: A content-based image retrieval scheme using bag-of- encrypted-words in cloud computing,” IEEE Transactions on Services Computing, 2019.
  28. Z. Xia, X. Ma, Z. Shen, X. Sun, N. N. Xiong, and B. Jeon, “Secure image LBP feature extraction in cloud- based smart campus,” IEEE Access, vol. 6, pp. 30392- 30401, 2018.
  29. Y. Xu, J. Gong, L. Xiong, Z. Xu, J. Wang, and Y.-q. Shi, “A privacy-preserving content-based image retrieval method in cloud environment,” Journal of Visual Communication and Image Representation, vol. 43, pp. 164-172, 2017.
  30. J. Anju, and R. Shreelekshmi, "Secure content-based image retrieval using combined features in cloud", International Conference on Distributed Computing and Internet Technology (ICDCIT 2020): Distributed Computing and Internet Technology, pp. 179-197, 2020.
  31. Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, "Towards efficient privacy-preserving image feature extraction in cloud computing", Proceedings of the 22nd ACM international conference on Multimedia, pp. 497– 506, 2014. DOI:10.1145/2647868.2654941
  32. J. Anju, and R. Shreelekshmi, “A faster secure content- based image retrieval using clustering for cloud,” Expert Systems with Applications, vol. 189, pp. 116070, 2022.
  33. Q. Gu, Z. Xia, and X. Sun, “MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing,” arXiv preprint arXiv:2007.12416, 2020.
  34. J. Sivic, and A. Zisserman, "Video Google: A text retrieval approach to object matching in videos", Proceedings Ninth IEEE International Conference on Computer Vision, pp. 1470-1470, 2003.
  35. C. Gentry, "Fully homomorphic encryption using ideal lattices", Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169–178, 2009. DOI:10.1145/1536414.1536440
  36. C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, "Secure and robust SIFT", Proceedings of the 17th ACM international conference on Multimedia, pp. 637–640, 2009. DOI:10.1145/1631272.1631376