Log in

Privacy preserving content based image retrieval

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid and tremendous growth of multimedia content has motivated users and organizations to upload their large scale digital content on the cloud server which makes the security of data an important issue. To overcome the problem of security in content based image retrieval (CBIR), we have proposed a novel privacy preserving image retrieval technique that efficiently retrieves similar images in an encrypted domain. Initially features of all the images in the database are extracted and then encrypted using secret key. In order to enhance the security, images are encrypted using Gauss-Square chaotic (GSC) map prior to outsourcing it to cloud server. Cloud uses modified euclidian distance (for encrypted features) to retrieve images similar to user encrypted query. Simulation results on Corel-1K and GHIM-10K illustrates that proposed technique efficiently retrieves encrypted images without compromising the retrieval accuracy. Moreover, the security analysis demonstrates the high security of proposed image encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Brazil)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

All data generated or analysed during this study are included within the article.

References

  1. Qin J, Li H, **ang X, Tan Y, Pan W, Ma W, **ong NN (2019) An encrypted image retrieval method based on Harris corner optimization and lsh in cloud computing. IEEE Access 7(1):24626–24633

    Article  Google Scholar 

  2. **a Z, Jiang L, Liu D, Jeon B (2019) BOEW: a contentbased image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans Serv Comput

  3. Ferreira B, Rodrigues J, Leitao J, Domingos H (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 7(3):784–798

    Article  Google Scholar 

  4. Liang H, Zhang X, Wei Q, Cheng H (2018) Secure image retrieval with multiple keys. J Electron Imaging 27(2):023032

    Article  Google Scholar 

  5. Cheng H, Zhang X, Yu J (2016) Ac-coefficient histogram-based retrieval for encrypted jpeg images. Multimed Tools Appl 75(21):13791–13803

    Article  Google Scholar 

  6. Shen M, Cheng G, Zhu L, Du X, Hu J (2020) Content-based multisource encrypted image retrieval in clouds with privacy preservation. Future Gener Comput Syst 109:621–632

    Article  Google Scholar 

  7. Wang J, Chen X, Ni J, Mao N, Shi Y (2019) Multiple histograms based reversible data hiding: framework and realization. IEEE Trans Circuits Syst Vid Technol 30(8):2313–2328

    Article  Google Scholar 

  8. Xu W, **ang S, Sachnev V (2018) A cryptograph domain image retrieval method based on Paillier homomorphic block encryption. Comput Mater Contin 55(2):285–295

    Google Scholar 

  9. (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75–85

  10. Razeghi B, Voloshynovskiy S (2018) Privacy-preserving outsourced media search using secure sparse ternary codes. 2018 IEEE international conference on acoustics, speech and signal processing, pp 1992–1996

  11. Pan W, Wang M, Qin J, Zhou Z (2021) Improved CNN-based hashing for encrypted image retrieval. Secur Commun Netw

  12. Hassan A, Liu F, Wang F, Wang Y (2021) Secure content based image retrieval for mobile users with deep neural networks in the cloud. J Syst Archit 116:102043

    Article  Google Scholar 

  13. Tang W, Zhao X, Rafique W, Qi L, Dou W, Ni Q (2019) An offloading method using decentralized p2p-enabled mobile edge servers in edge computing. J Syst Archit 94:1–13

    Article  Google Scholar 

  14. Polyakov Y, Rohloff K, Ryan GW (2018) Palisade lattice cryptography library

  15. Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. International Conference on Machine Learning, pp 201–210

  16. Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: A low latency framework for secure neural network inference. 27th USENIX Security Symposium (USENIX Security 18), USENIX Association, Baltimore, MD, pp 1651–1669

  17. Suciati N, Kridanto A, Naufal MF, Machmud M, Wicaksono AY (2015) Fast discrete curvelet transform and HSV color features for batik image classification. International Conference on Information & Communication Technology and Systems, pp 99–104

  18. Fathian M, Akhlaghian Tab F (2011) A Novel ContentBased Image Retrieval Approach Using Fuzzy Combination of Color and Texture. Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part III Springer-Verlag Berlin, Heidelberg

  19. Raj Singh S, Kohli S (2015) Enhanced CBIR using Color Moments, HSV Histogram, Color Auto Correlogram, and Gabor Texture. Int J Comput Syst 2(5)

  20. (2005) Moment based features for content based image retrieval. ICINCO 395–398

  21. Barbu T (2009) Content-Based Image Retrieval Using Gabor Filtering. 20th International Workshop on Database and Expert Systems Application, pp 236–240

  22. Srivastava P, Prakash O, Khare A (2014) Content-Based Image Retrieval using moments of wavelet transform. The 2014 International Conference on Control, Automation and Information Sciences, pp 159–164

  23. Ahmad M, Bhatia D, Hassan Y (2015) A novel colony optimization based scheme for substitution box design. Comput Sci Proc 57:572–580

    Article  Google Scholar 

  24. Wu Y, Zhao Q, Feng W (2014) Fault diagnosis method of generator based on mutative scale chaos combined clustering and feature fusion. Proceedings of the 2013 International Conference on Electrical and Information Technologies for Rail Transportation, no 287, pp 119–128

  25. Benettin G, Galgani L, Giorgilli A (1980) Lyapunov characteristic exponents for smooth dynamical systems and for hamiltonian systems. Part 2: Numerical applications Meccanical, vol. 15, pp 21–30

  26. Kayani M, Mohsin Riaz M, Ghafoor A (2022) Efficient Region of Interest Encryption Based on a New Chaotic Map. International Journal of Bifurcation and Chaos 32(12):2250175

    Article  MathSciNet  Google Scholar 

  27. Chou JK, Yang CK, Chang HC (2016) Encryption domain content-based image retrieval and convolution through a block-based transformation algorithm. Multimed Tools Appl 750(21):13805–13832

    Article  Google Scholar 

  28. Hua a Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

  29. Gonzalez RC, Woods RE (1992) Digital Image Processing. Addison-Wesley, New York

    Google Scholar 

  30. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(8):2129–2151

    Article  MathSciNet  Google Scholar 

  31. Castro JCH, Sierra JM, Seznec A, Izquierdo A, Ribagorda A (2005) The strict avalanche criterion randomness test. Math Comput Simul 68(1):1–7

    Article  MathSciNet  Google Scholar 

  32. Wu Y, Noonan JP, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Cyber Journals: Journal of Selected Areas in Telecommunication (JSAT), pp 31-38

  33. Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai AY (2022) Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access 10:12966–12982

    Article  Google Scholar 

  34. Luo Y, Cao L, Qiu S, Hui L, Harkin J, Liu J (2016) A chaotic mapcontrol based and the plain image-related cryptosystem. Nonlinear Dyns. 83:2293–2310

    Article  Google Scholar 

  35. Qiaoyun X, Kehui S, Shaobo H, Congxu Z (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134:106178

    Article  Google Scholar 

  36. Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using rt-enhanced chaotic tent maps. IEEE Access 6:18759–18770

    Article  Google Scholar 

  37. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) SP 800–22 Rev. 1A. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology

  38. Tsafack N, Kengne J (2019) Multiple coexisting attractors in a generalized chua’s circuit with a smoothly adjustable symmetry and nonlinearity. J Phys Math 10(298):0902–2090

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Ghafoor.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kayani, M., Riaz, M.M., Ghafoor, A. et al. Privacy preserving content based image retrieval. Multimed Tools Appl 83, 44955–44978 (2024). https://doi.org/10.1007/s11042-023-17168-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17168-x

Keywords

Navigation