A Novel Security Aware Approach in Content Based Image Retrieval System using Trapdoor Verification for Cloud Environment

Authors

  • Pushpanjali M. Chouragade PhD Research Scholar and Assistant Professor in Computer Science and Engineering Department, Government College of Engineering, Amravati, Maharashtra, India
  • Premchand Bhagwan Ambhore Assistant Professor in Information Technology Department, Government College of Engineering, Amravati, Maharashtra, India

Keywords:

Content Based Image Retrieval, Information Sharing, Privacy Preservation, Cloud Environment

Abstract

Despite the fact that internet technology has accelerated the revolution in how images are distributed, it has also greatly increased the prevalence of illegally copying and using images. Numerous issues exist, including a protracted audit cycle, a lack of in-depth examination, a difficulty with the evidence, excessive costs, centralized storage, and more. It also raises privacy concerns since images often include sensitive personal information that may be immediately outsourced to the cloud utilizing image datasets. Encrypting the sensitive data before transferring or uploading it to the cloud is one approach to sort these things out. Once the data has been uploaded, the use will request particular target image data from the cloud server. At this time, content-based image retrieval (CBIR) is the method utilized to search for the target data. However, this approach lacks the capacity to search encrypted image data, hence this system attempts to address the issue of searching encrypted image.

Downloads

Download data is not yet available.

References

Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik, “Efficient Techniques for Privacy Preserving Sharing of Sensitive Information”, in Trust and Trustworthy Computing, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, Vol. 6740, pp.1-15, 2011, https://doi.org/10.1007/978-3-642-21599-5_18

H. Cheng, X. Zhang, J. Yu, and F. Li, “Markov Process Based Retrieval for Encrypted JPEG Images”, in Proceeding of IEEE 10th International Conference on Availability, Reliability and Security, 2015, pp. 417-421, doi: 10.1109/ARES.2015.18.

J. Yuan, S. Yu, and L. Guo, “SEISA: Secure and efficient encrypted image search with access control”, in Proceeding of IEEE Conference Computing Communication (INFOCOM), pp. 2083-2091, Apr. 2015, doi: 10.1109/INFOCOM.2015.7218593

D. Huang, X. Geng, L. Wei, and C. Su, “A secure query scheme on encrypted remote sensing images based on Henon mapping”, in Journal of Software, Research Gate, Vol. 27, no. 7, pp. 1729–1740, Jul. 2016, doi: 10.13328/j.cnki.jos.005039.

T. K. Hazra, S. R. Chowdhury, and A. K. Chakraborty, “Encrypted Image Retrieval System: A machine learning approach”, IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1-6, Oct. 2016, doi: 10.1109/IEMCON.2016.7746351.

Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. and Ren, K., “A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing”, in IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016, doi: 10.1109/TIFS.2016.2590944.

H. Liu and H. Go, “Privacy-Enhanced Similarity Search Scheme for Cloud ImageDatabases”, IEICE Transaction on Information and System, Vol. E99-D, no. 12, pp. 188–3191, Dec. 2016, doi: 10.1587/transinf.2016EDL8141.

X. Li, Q. Xue, and M. C. Chuah, “Casheirs: Cloud Assisted Scalable Hierarchical Encrypted Based Image Retrieval System”, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1-9, 2017, doi: 10.1109/INFOCOM.2017.8056953. 8

Z. Xia, N. N. Xiong, A. V. Vasilakos, and X. Sun, “EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing”, InformationSciences, Vol. 387, pp. 195-204, Dec. 2017, https://doi.org/10.1016/j.ins.2016.12.030.

Xia, Z., Zhu, Y., Sun, X., Qin, Z. and Ren, K., “Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing”, in IEEE Transactions on CloudComputing, vol. 6, no. 1, pp. 276-286, 1 Jan.- March 2018, doi:10.1109/TCC.2015.2491933

J. Gong, Y. Xu, and X. Zhao, “A Privacy-preserving Image Retrieval Method Based onImproved BoVW Model in Cloud Environment”, IETE Technical Review, Vol. 35, no.sup1, pp. 76-84, 2018, doi: 10.1080/02564602.2018.1526654

Li, X., Li, J., Yiu, S. et al., “Privacy-preserving edge-assisted image retrieval andclassification in IoT”, in Frontiers of Computer Science, Springer Nature, 13, pp.1136–1147, 2019, https://doi.org/10.1007/s11704-018-8067-z

B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Practical Privacy-PreservingContent-Based Retrieval in Cloud Image Repositories”, in IEEE Transaction on CloudComputing, Vol. 7, no. 3, pp. 784-798, 1 July-Sept. 2019,

doi: 10.1109/TCC.2017.2669999.

R. Mehta, N. Kapoor, S. Sourav and R. Shorey, “Decentralised Image Sharing andCopyright Protection using Blockchain and Perceptual Hashes”, 11th InternationalConference on Communication Systems & Networks (COMSNETS), Bengaluru, India,pp. 1-6, 2019, https://doi: 10.1109/COMSNETS.2019.8711440.

Meng Shen, Yawen Deng, Liehuang Zhu, Xiaojiang Du, and Nadra Guizani, “Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach”,in IEEE Network (Edge Intelligence for The Industrial Internet of Things), pp.27-33,Sept.-Oct. 2019, https://doi: 10.1109/MNET.001.180050

H. Wang, Z. Xia, J. Fei and F. Xiao, “An AES-Based Secure Image Retrieval SchemeUsing Random Mapping and BOW in Cloud Computing”, in IEEE Access, Vol. 8, pp.61138-61147, 2020, doi: 10.1109/ACCESS.2020.2983194.

M. Shen, G. Cheng, L. Zhu, X. Du, J. Hu, “Content-based multi-source encrypted imageretrieval in clouds with privacy preservation”, Future Generation Computer Systems,Vol. 109, pp. 621-632, 2020,https://doi.org/10.1016/j.future.2018.04.089

L. Jiang, C. Xu, X. Wang, B. Luo, and H. Wang, “Secure outsourcing SIFT: Efficientand privacy-preserving image feature extraction in the encrypted domain”, in IEEETransactions on Dependable and Secure Computing, vol. 17, no. 1, pp. 179-193, 1 Jan.-Feb. 2020, doi: 10.1109/TDSC.2017.2751476.9

Anyu Du 1, Liejun Wang, Shuli Cheng and NaixiangAo, “A Privacy-Protected ImageRetrieval Scheme for Fast and Secure Image Search”, MDPI - Symmetry 2020, 12(2),282, Feb 2020, https://doi:10.3390/sym12020282

Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia and Zifeng Xu, “Privacy-PreservingImage Retrieval and Sharing in Social Multimedia Applications”, inIEEE Access, Vol.8,pp. 66828-66838, Mar 2020,https://doi.org/10.1109/ACCESS.2020.2984916

Hu, Lishuang& Xiang, Tao & Guo, Shangwei, “SensIR: Towards privacy-sensitiveimage retrieval in the cloud”, Signal Processing: Image Communication, 84, 115837,Mar 2020,doi: 10.1016/j.image.2020.115837

Chengyuan Zhang, Lei Zhu, Shichao Zhang, Weiren Yu, “TDHPPIR: An Efficient DeepHashing Based Privacy-Preserving Image Retrieval Method”, Neurocomputing, Vol.406, pp. 386-398, April 2020,https://doi.org/10.1016/j.neucom.2019.11.11

Youcef Imine, Ahmed Lounis, AbdelmadjidBouabdallah, “An accountable privacy-preserving scheme for public information sharing systems”, Elsevier (Computers &Security), Vol. 93, 101786, 2020, https://doi.org/10.1016/j.cose.2020.101786

K. Iida and H. Kiya, “Privacy-Preserving Content-Based Image Retrieval UsingCompressible Encrypted Images”, in IEEE Access, vol. 8, pp. 200038-200050, Nov2020, doi: 10.1109/ACCESS.2020.3035563.

K. Iida and H. Kiya, “A Privacy-Preserving Content-Based Image Retrieval SchemeAllowing Mixed Use of Encrypted and Plain Images”, 2020 Asia-Pacific Signal andInformation Processing Association Annual Summit and Conference (APSIPA ASC), pp.1436-1441, Dec 2020.

Wang, Z., Qin, J., Xiang, X. et al., “A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing”, in Multimedia Systems 27, pp.403–415, Jan 2021, https://doi.org/10.1007/s00530-02000734-w

K. Iida and H. Kiya, “Privacy-preserving Image Retrieval Scheme Allowing Mixed Useof Lossless and JPEG Compressed Images”, 2021 IEEE 3rd Global Conference on LifeSciences and Technologies (LifeTech), pp. 37-39, April 2021,doi:10.1109/LifeTech52111.2021.9391868.

[28] L. Wang and H. Yu, “A Secure Searchable Image Retrieval Scheme with CorrectRetrieval Identity”, 2021 IEEE International Conference on Acoustics, Speech andSignal Processing (ICASSP), pp. 8183-8187, May 2021,doi: 10.1109/ICASSP39728.2021.94140240

Kumar, S., Pal, A.K., Islam, S. et al., “Secure and efficient image retrieval throughinvariant features selection in insecure cloud environments”, in Neural Computing &Applications, June 2021, https://doi.org/10.1007/s00521-021-06054-y

J. T and B. M, “SEcure Similar Image Matching (SESIM): An Improved PrivacyPreserving Image Retrieval Protocol over Encrypted Cloud Database”, in IEEETransactions on Multimedia, August 2021, doi: 10.1109/TMM.2021.3107681.

Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.

R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, "RDPC: Secure Cloud Storage with Deduplication Technique," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280-1283, doi: 10.1109/I-SMAC49090.2020.9243442.

Prof. Bhushan Thakre, Dr. R.M Thakre. (2017). Analysis of Modified Current Controller and its Implementation in Automotive LED. International Journal of New Practices in Management and Engineering, 6(04), 01 - 06. https://doi.org/10.17762/ijnpme.v6i04.60

Smith, J., Ivanov, G., Petrović, M., Silva, J., & García, A. Detecting Fake News: A Machine Learning Approach. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/142

Dhingra, M., Dhabliya, D., Dubey, M. K., Gupta, A., & Reddy, D. H. (2022). A review oncomparison of machine learning algorithms for text classification. Paper presented at theProceedings of 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, 1818-1823. doi:10.1109/IC3I56241.2022.10072502 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Chouragade, P. M. ., & Ambhore, P. B. . (2023). A Novel Security Aware Approach in Content Based Image Retrieval System using Trapdoor Verification for Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 84–93. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3236

Issue

Section

Research Article