Cover
Vol. 18 No. 2 (2022)

Published: December 31, 2022

Pages: 82-91

Original Article

Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment

Abstract

Every day, a tremendous amount of image data is generated as a result of recent advances in imaging and computing technology. Several content-based image retrieval (CBIR) approaches have been introduced for searching image collections. These methods, however, involve greater computing and storage resources. Cloud servers can address this issue by offering a large amount of computational power at a low cost. However, cloud servers are not completely trustworthy, and data owners are concerned about the privacy of their personal information. In this research, we propose and implement a secure CBIR (SCBIR) strategy for searching and retrieving cipher text image databases. In the proposed scheme, the extract aggregated feature vectors to represent the related image collection and use a safe Asymmetric Scalar-Product-Preserving Encryption (ASPE) approach to encrypt these vectors while still allowing for similarity computation. To improve search time, all encrypted features are recursively clustered using the k-means method to create a tree index. The results reveal that SCBIR is faster at indexing and retrieving than earlier systems, with superior retrieval precision and scalability. In addition, our paper introduces the watermark to discover any illegal distributions of the images that are received by unlawful data users. Particularly, the cloud server integrates a unique watermark directly into the encrypted images before sending them to the data users. As a result, if an unapproved image copy is revealed, the watermark can be extracted and the unauthorized data users who spread the image can be identified. The performance of the proposed scheme is proved, while its performance is demonstrated through experimental results.

References

  1. Y. Mingqiang, K. Kidiyo, and R. Joseph, “A survey of shape feature extraction techniques,” Pattern recognition, vol. 15, no. 7, pp. 43-90, 2008.
  2. H. Al-Jubouri and H. Du, “A Content-Based Image Retrieval Method By Exploiting Cluster Shapes,” Iraqi Journal for Electrical & Electronic Engineering, vol. 14, no. 2, 2018.
  3. J. R. Smith and S.-F. Chang, “Tools and techniques for color image retrieval,” in Storage and retrieval for still image and video databases iv, 1996, vol. 2670: International Society for Optics and Photonics, pp. 426- 437.
  4. B. S. Manjunath and W.-Y. Ma, “Texture features for browsing and retrieval of image data,” IEEE Transactions on pattern analysis and machine intelligence, vol. 18, no. 8, pp. 837-842, 1996.
  5. S. K. Abdulateef and M. D. Salman, “A Comprehensive Review of Image Segmentation Techniques,” Iraqi Journal for Electrical & Electronic Engineering, vol. 17, no. 2, 2021.
  6. C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, “Secure and robust SIFT,” in Proceedings of the 17th ACM international conference on Multimedia, 2009, pp. 637-640.
  7. H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-up robust features (SURF),” Computer vision and image understanding, vol. 110, no. 3, pp. 346-359, 2008.
  8. E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, “ORB: An efficient alternative to SIFT or SURF,” in 2011 International conference on computer vision, 2011: Ieee, pp. 2564-2571.
  9. Z. Xia, X. Ma, Z. Shen, X. Sun, N. N. Xiong, and B. Jeon, “Secure image LBP feature extraction in cloud- based smart campus,” IEEE Access, vol. 6, pp. 30392- 30401, 2018.
  10. H. Jégou, M. Douze, C. Schmid, and P. Pérez, “Aggregating local descriptors into a compact image representation,” in 2010 IEEE computer society conference on computer vision and pattern recognition, 2010: IEEE, pp. 3304-3311.
  11. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the forty-first annual ACM symposium on Theory of computing, 2009, pp. 169-178.
  12. W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009, pp. 139-152.
  13. W. Lu, A. L. Varna, A. Swaminathan, and M. Wu, “Secure image retrieval through feature protection,” in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 2009: IEEE, pp. 1533-1536.
  14. L. Zhang et al., “Pic: Enable large-scale privacy preserving content-based image search on cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 11, pp. 3258-3271, 2017.
  15. W. Lu, A. L. Varna, and M. Wu, “Confidentiality- preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization,” IEEE Access, vol. 2, pp. 125-141, 2014.
  16. J. Qin et al., “An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing,” IEEE Access, vol. 7, pp. 24626-24633, 2019.
  17. Z. A. Abduljabbar, A. Ibrahim, M. A. Hussain, Z. A. Hussien, M. A. Al Sibahee, and S. Lu, “EEIRI: efficient encrypted image retrieval in IoT-cloud,” KSII Transactions on Internet and Information Systems (TIIS), vol. 13, no. 11, pp. 5692-5716, 2019.
  18. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing,” IEEE transactions on information forensics and security, vol. 11, no. 11, pp. 2594-2608, 2016.
  19. Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, “Towards privacy-preserving content-based image retrieval in cloud computing,” IEEE Transactions on Cloud Computing, vol. 6, no. 1, pp. 276-286, 2015.
  20. H. Cheng, X. Zhang, J. Yu, and Y. Zhang, “Encrypted JPEG image retrieval using block-wise feature comparison,” Journal of Visual Communication and Image Representation, vol. 40, pp. 111-117, 2016.
  21. H. Cheng, X. Zhang, J. Yu, and F. Li, “Markov process- based retrieval for encrypted JPEG images,” EURASIP Journal on Information Security, vol. 2016, no. 1, pp. 1-9, 2016.
  22. B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Privacy-preserving content-based image retrieval in the cloud,” in 2015 IEEE 34th symposium on reliable distributed systems (SRDS), 2015: IEEE, pp. 11-20.
  23. B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Practical privacy-preserving content-based retrieval in cloud image repositories,” IEEE Transactions on Cloud Computing, vol. 7, no. 3, pp. 784-798, 2017.
  24. H. Wang, Z. Xia, J. Fei, and F. Xiao, “An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing,” IEEE Access, vol. 8, pp. 61138-61147, 2020.
  25. Z. Xia, L. Lu, T. Qin, H. Shim, X. Chen, and B. Jeon, “A privacy-preserving image retrieval based on AC- coefficients and color histograms in cloud environment,” CMC-COMPUTERS MATERIALS & CONTINUA, vol. 58, no. 1, pp. 27-43, 2019.
  26. Z. Xia, L. Jiang, D. Liu, L. Lu, and B. Jeon, “BOEW: A content-based image retrieval scheme using bag-of- encrypted-words in cloud computing,” IEEE Transactions on Services Computing, 2019.
  27. J. Anju and R. Shreelekshmi, “Secure content-based image retrieval using combined features in cloud,” in International Conference On Distributed Computing And Internet Technology, 2020: Springer, pp. 179-197.
  28. H. Cui, X. Yuan, and C. Wang, “Harnessing encrypted data in cloud for secure and efficient mobile image sharing,” IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1315-1329, 2016.
  29. M. Douze, A. Ramisa, and C. Schmid, “Combining attributes and fisher vectors for efficient image retrieval,” in CVPR 2011, 2011: IEEE, pp. 745-752.
  30. Q. Gu, Z. Xia, and X. Sun, “MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing,” arXiv preprint arXiv:2007.12416, 2020.
  31. C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, “Image feature extraction in encrypted domain with privacy-preserving SIFT,” IEEE transactions on image processing, vol. 21, no. 11, pp. 4593-4607, 2012.
  32. A. I. Abdul-Sada, “Hiding data using LSB-3,” J. Basrah Researches (Sciences), vol. 33, no. 4, pp. 81-88, 2007.
  33. Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient privacy-preserving image feature extraction in cloud computing,” in Proceedings of the 22nd ACM international conference on multimedia, 2014, pp. 497-506.
  34. Y. Xu, J. Gong, L. Xiong, Z. Xu, J. Wang, and Y.-q. Shi, “A privacy-preserving content-based image retrieval method in cloud environment,” Journal of Visual Communication and Image Representation, vol. 43, pp. 164-172, 2017.
  35. J. Anju and R. Shreelekshmi, “A faster secure content- based image retrieval using clustering for cloud,” Expert Systems with Applications, vol. 189, p. 116070, 2022.
  36. J. Sivic and A. Zisserman, “Video Google: A text retrieval approach to object matching in videos,” in Computer Vision, IEEE International Conference on, 2003, vol. 3: IEEE Computer Society, pp. 1470-1470.
  37. A. Piva, F. Bartolini, and M. Barni, “Managing copyright in open networks,” IEEE Internet Computing, vol. 6, no. 3, pp. 18-26, 2002.
  38. N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Transactions on image processing, vol. 10, no. 4, pp. 643-649, 2001.
  39. M. Deng, T. Bianchi, A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proceedings of the 11th ACM Workshop on Multimedia and Security, 2009, pp. 9-18.
  40. A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, “A provably secure anonymous buyer–seller watermarking protocol,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 920- 931, 2010.
  41. X. Zhang, “Reversible data hiding in encrypted image,” IEEE signal processing letters, vol. 18, no. 4, pp. 255-258, 2011.