A Novel Security Aware Approach in Content Based Image Retrieval System using Trapdoor Verification for Cloud Environment
Keywords:
Content Based Image Retrieval, Information Sharing, Privacy Preservation, Cloud EnvironmentAbstract
Despite the fact that internet technology has accelerated the revolution in how images are distributed, it has also greatly increased the prevalence of illegally copying and using images. Numerous issues exist, including a protracted audit cycle, a lack of in-depth examination, a difficulty with the evidence, excessive costs, centralized storage, and more. It also raises privacy concerns since images often include sensitive personal information that may be immediately outsourced to the cloud utilizing image datasets. Encrypting the sensitive data before transferring or uploading it to the cloud is one approach to sort these things out. Once the data has been uploaded, the use will request particular target image data from the cloud server. At this time, content-based image retrieval (CBIR) is the method utilized to search for the target data. However, this approach lacks the capacity to search encrypted image data, hence this system attempts to address the issue of searching encrypted image.
Downloads
References
Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik, “Efficient Techniques for Privacy Preserving Sharing of Sensitive Information”, in Trust and Trustworthy Computing, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, Vol. 6740, pp.1-15, 2011, https://doi.org/10.1007/978-3-642-21599-5_18
H. Cheng, X. Zhang, J. Yu, and F. Li, “Markov Process Based Retrieval for Encrypted JPEG Images”, in Proceeding of IEEE 10th International Conference on Availability, Reliability and Security, 2015, pp. 417-421, doi: 10.1109/ARES.2015.18.
J. Yuan, S. Yu, and L. Guo, “SEISA: Secure and efficient encrypted image search with access control”, in Proceeding of IEEE Conference Computing Communication (INFOCOM), pp. 2083-2091, Apr. 2015, doi: 10.1109/INFOCOM.2015.7218593
D. Huang, X. Geng, L. Wei, and C. Su, “A secure query scheme on encrypted remote sensing images based on Henon mapping”, in Journal of Software, Research Gate, Vol. 27, no. 7, pp. 1729–1740, Jul. 2016, doi: 10.13328/j.cnki.jos.005039.
T. K. Hazra, S. R. Chowdhury, and A. K. Chakraborty, “Encrypted Image Retrieval System: A machine learning approach”, IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1-6, Oct. 2016, doi: 10.1109/IEMCON.2016.7746351.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. and Ren, K., “A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing”, in IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016, doi: 10.1109/TIFS.2016.2590944.
H. Liu and H. Go, “Privacy-Enhanced Similarity Search Scheme for Cloud ImageDatabases”, IEICE Transaction on Information and System, Vol. E99-D, no. 12, pp. 188–3191, Dec. 2016, doi: 10.1587/transinf.2016EDL8141.
X. Li, Q. Xue, and M. C. Chuah, “Casheirs: Cloud Assisted Scalable Hierarchical Encrypted Based Image Retrieval System”, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1-9, 2017, doi: 10.1109/INFOCOM.2017.8056953. 8
Z. Xia, N. N. Xiong, A. V. Vasilakos, and X. Sun, “EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing”, InformationSciences, Vol. 387, pp. 195-204, Dec. 2017, https://doi.org/10.1016/j.ins.2016.12.030.
Xia, Z., Zhu, Y., Sun, X., Qin, Z. and Ren, K., “Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing”, in IEEE Transactions on CloudComputing, vol. 6, no. 1, pp. 276-286, 1 Jan.- March 2018, doi:10.1109/TCC.2015.2491933
J. Gong, Y. Xu, and X. Zhao, “A Privacy-preserving Image Retrieval Method Based onImproved BoVW Model in Cloud Environment”, IETE Technical Review, Vol. 35, no.sup1, pp. 76-84, 2018, doi: 10.1080/02564602.2018.1526654
Li, X., Li, J., Yiu, S. et al., “Privacy-preserving edge-assisted image retrieval andclassification in IoT”, in Frontiers of Computer Science, Springer Nature, 13, pp.1136–1147, 2019, https://doi.org/10.1007/s11704-018-8067-z
B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Practical Privacy-PreservingContent-Based Retrieval in Cloud Image Repositories”, in IEEE Transaction on CloudComputing, Vol. 7, no. 3, pp. 784-798, 1 July-Sept. 2019,
doi: 10.1109/TCC.2017.2669999.
R. Mehta, N. Kapoor, S. Sourav and R. Shorey, “Decentralised Image Sharing andCopyright Protection using Blockchain and Perceptual Hashes”, 11th InternationalConference on Communication Systems & Networks (COMSNETS), Bengaluru, India,pp. 1-6, 2019, https://doi: 10.1109/COMSNETS.2019.8711440.
Meng Shen, Yawen Deng, Liehuang Zhu, Xiaojiang Du, and Nadra Guizani, “Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach”,in IEEE Network (Edge Intelligence for The Industrial Internet of Things), pp.27-33,Sept.-Oct. 2019, https://doi: 10.1109/MNET.001.180050
H. Wang, Z. Xia, J. Fei and F. Xiao, “An AES-Based Secure Image Retrieval SchemeUsing Random Mapping and BOW in Cloud Computing”, in IEEE Access, Vol. 8, pp.61138-61147, 2020, doi: 10.1109/ACCESS.2020.2983194.
M. Shen, G. Cheng, L. Zhu, X. Du, J. Hu, “Content-based multi-source encrypted imageretrieval in clouds with privacy preservation”, Future Generation Computer Systems,Vol. 109, pp. 621-632, 2020,https://doi.org/10.1016/j.future.2018.04.089
L. Jiang, C. Xu, X. Wang, B. Luo, and H. Wang, “Secure outsourcing SIFT: Efficientand privacy-preserving image feature extraction in the encrypted domain”, in IEEETransactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 179-193, 1 Jan.-Feb. 2020, doi: 10.1109/TDSC.2017.2751476.9
Anyu Du 1, Liejun Wang, Shuli Cheng and NaixiangAo, “A Privacy-Protected ImageRetrieval Scheme for Fast and Secure Image Search”, MDPI - Symmetry 2020, 12(2),282, Feb 2020, https://doi:10.3390/sym12020282
Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia and Zifeng Xu, “Privacy-PreservingImage Retrieval and Sharing in Social Multimedia Applications”, inIEEE Access, Vol.8,pp. 66828-66838, Mar 2020,https://doi.org/10.1109/ACCESS.2020.2984916
Hu, Lishuang& Xiang, Tao & Guo, Shangwei, “SensIR: Towards privacy-sensitiveimage retrieval in the cloud”, Signal Processing: Image Communication, 84, 115837,Mar 2020,doi: 10.1016/j.image.2020.115837
Chengyuan Zhang, Lei Zhu, Shichao Zhang, Weiren Yu, “TDHPPIR: An Efficient DeepHashing Based Privacy-Preserving Image Retrieval Method”, Neurocomputing, Vol.406, pp. 386-398, April 2020,https://doi.org/10.1016/j.neucom.2019.11.11
Youcef Imine, Ahmed Lounis, AbdelmadjidBouabdallah, “An accountable privacy-preserving scheme for public information sharing systems”, Elsevier (Computers &Security), Vol. 93, 101786, 2020, https://doi.org/10.1016/j.cose.2020.101786
K. Iida and H. Kiya, “Privacy-Preserving Content-Based Image Retrieval UsingCompressible Encrypted Images”, in IEEE Access, vol. 8, pp. 200038-200050, Nov2020, doi: 10.1109/ACCESS.2020.3035563.
K. Iida and H. Kiya, “A Privacy-Preserving Content-Based Image Retrieval SchemeAllowing Mixed Use of Encrypted and Plain Images”, 2020 Asia-Pacific Signal andInformation Processing Association Annual Summit and Conference (APSIPA ASC), pp.1436-1441, Dec 2020.
Wang, Z., Qin, J., Xiang, X. et al., “A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing”, in Multimedia Systems 27, pp.403–415, Jan 2021, https://doi.org/10.1007/s00530-02000734-w
K. Iida and H. Kiya, “Privacy-preserving Image Retrieval Scheme Allowing Mixed Useof Lossless and JPEG Compressed Images”, 2021 IEEE 3rd Global Conference on LifeSciences and Technologies (LifeTech), pp. 37-39, April 2021,doi:10.1109/LifeTech52111.2021.9391868.
[28] L. Wang and H. Yu, “A Secure Searchable Image Retrieval Scheme with CorrectRetrieval Identity”, 2021 IEEE International Conference on Acoustics, Speech andSignal Processing (ICASSP), pp. 8183-8187, May 2021,doi: 10.1109/ICASSP39728.2021.94140240
Kumar, S., Pal, A.K., Islam, S. et al., “Secure and efficient image retrieval throughinvariant features selection in insecure cloud environments”, in Neural Computing &Applications, June 2021, https://doi.org/10.1007/s00521-021-06054-y
J. T and B. M, “SEcure Similar Image Matching (SESIM): An Improved PrivacyPreserving Image Retrieval Protocol over Encrypted Cloud Database”, in IEEETransactions on Multimedia, August 2021, doi: 10.1109/TMM.2021.3107681.
Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.
R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, "RDPC: Secure Cloud Storage with Deduplication Technique," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280-1283, doi: 10.1109/I-SMAC49090.2020.9243442.
Prof. Bhushan Thakre, Dr. R.M Thakre. (2017). Analysis of Modified Current Controller and its Implementation in Automotive LED. International Journal of New Practices in Management and Engineering, 6(04), 01 - 06. https://doi.org/10.17762/ijnpme.v6i04.60
Smith, J., Ivanov, G., Petrović, M., Silva, J., & García, A. Detecting Fake News: A Machine Learning Approach. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/142
Dhingra, M., Dhabliya, D., Dubey, M. K., Gupta, A., & Reddy, D. H. (2022). A review oncomparison of machine learning algorithms for text classification. Paper presented at theProceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, 1818-1823. doi:10.1109/IC3I56241.2022.10072502 Retrieved from www.scopus.com
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.