网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (4): 14-28.doi: 10.11959/j.issn.2096-109x.2019035
• 专栏:隐私保护关键技术及其新型应用模式探索 • 上一篇 下一篇
修回日期:
2019-01-08
出版日期:
2019-08-15
发布日期:
2019-08-20
作者简介:
吴颖(1995- ),女,福建漳州人,福建师范大学硕士生,主要研究方向为隐私保护。|李璇(1984- ),女,湖北黄石人,博士,福建师范大学副教授,主要研究方向为云数据安全与隐私保护。|金彪(1985- ),男,安徽六安人,博士,福建师范大学讲师,主要研究方向为信息安全。|金榕榕(1998- ),女,江西南昌人,主要研究方向为计算机视觉和图像处理。
基金资助:
Ying WU1,Xuan LI1,2,3(),Biao JIN1,Rongrong JIN1
Revised:
2019-01-08
Online:
2019-08-15
Published:
2019-08-20
Supported by:
摘要:
随着智能设备与社交媒体的广泛普及,图片数据的数量急剧增长,数据拥有者将本地数据外包至云平台,在云服务器上实现数据的存储、分享和检索。然而,图像数据含有大量有关用户的敏感信息,外部攻击者和不完全可信的云服务器都试图获取原始图像的内容,窥探用户隐私,造成严重的隐私泄露风险。回顾了近年来隐私保护需求下图像内容检索技术的研究进展,总结了应用于该技术的图像加密算法,包括同态加密、随机化加密和比较加密,围绕这3种密码技术,详细分析和比较了典型的解决方案,并介绍了索引构造的改进策略。最后,总结和展望了未来的研究趋势。
中图分类号:
吴颖,李璇,金彪,金榕榕. 隐私保护的图像内容检索技术研究综述[J]. 网络与信息安全学报, 2019, 5(4): 14-28.
Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval[J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28.
表1
典型PPCBIR方案的关键环节"
方案 | 特征/索引 | 加密算法 | 相似性度量算法 |
Zhang[ | 低级特征→局部保留投影 | Paillier | 欧氏距离→MSB |
Bellafqira[ | 小波子带直方图 | Paillier | L1距离 |
Lu[ | 视觉特征 | 平面随机化 | 汉明距离 |
随机投影 | L1距离 | ||
随机化一元编码 | L1距离 | ||
Shen[ | SIFT特征 | Jung[ | 欧氏距离→SMC |
Ferreira[ | 颜色/纹理 | 像素行位移 | 汉明距离 |
Cheng[ | DCT系数直方图 | DCT系数置乱 | 曼哈顿距离 |
Han[ | DCT系数差分特征→LBP | DCT系数置乱 | 曼哈顿距离 |
Huang[ | VLAD | Wong[ | 内积计算 |
Huang[ | PoV | 类混淆 | SVM分类器 |
Zou[ | SIFT特征→LSH | 比较加密 | 欧式距离 |
Zhu[ | LSH | AES | 内积计算 |
Zhu[ | LSH | 安全线性规划转换 | EMD距离 |
Xia[ | LSH | Wong[ | 内积计算 |
[1] | KAMARA S , LAUTER K . Cryptographic cloud storage[C]// International Conference on Financial Cryptography and Data Security,Berlin:Springer Berlin Heidelberg, 2010. 136-149. |
[2] | LEON P , UR B , SHAY R ,et al. Why Johnny can't opt out:a usability evaluation of tools to limit online behavioral advertising[C]// Sigchi Conference on Human Factors in Computing Systems, 2012: 589-598. |
[3] | NAIMIA I , WESTREICH D J . Big data:a revolution that will transform how we live,work,and think[J]. Mathematics & Computer Education, 2014,47(17): 181-183. |
[4] | LAGENDIJK R L , BARNI M . Encrypted signal processing for privacy protection:conveying the utility of homomorphic encryption and multiparty computation[J]. IEEE Signal Processing Magazine, 2013,30(1): 82-105. |
[5] | RUPA C , . Privacy preservation of ROI of medical image using squint pixel and PLSB hiding technique[C]// International Conference on Virtual System & Multimedia. IEEE, 2017: 1-5. |
[6] | DUFAUX F . Video scrambling for privacy protection in video surveillance - recent results and validation framework[J]. Proceedings of SPIE-The International Society for Optical Engineering, 2011,8063: 307-314. |
[7] | GUDIVADA V N , RAGHAVAN V V . Content based image retrieval systems[J]. Computer, 1995,28(9): 18-22. |
[8] | SMITH J R , CHANG S F . Tools and techniques for color image retrieval[J]. Proc.of SPIE(The International Society for Optical Engineering) 1996, 2670: 32-42. |
[9] | JAIN A K , VAILAYA A . Image retrieval using color and shape[J]. Pattern Recognition, 1996,29(8): 1233-1244. |
[10] | DUNN D , HIGGINS W E , WAKELEY J . Texture segmentation using 2D Gabor elementary functions[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1994,16(2): 0-149. |
[11] | MANJUNATH B S , MA W Y . Texture features for browsing and retrieval of image data[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1996,18(8): 837-842. |
[12] | LOWE D G . Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004,60(2): 91-110. |
[13] | JEGOU H , DOUZE M , SCHMID C ,et al. Aggregating local descriptors into a compact image representation[C]// IEEE Conference on Computer Vision and Pattern Recognition. 2010: 3304-3311. |
[14] | YANG B , CHEN S . A comparative study on local binary pattern (LBP) based face recognition:LBP histogram versus LBP image[J]. Neurocomputing, 2013,120(10): 365-379. |
[15] | SHEKHAR R , JAWAHAR C V . Word image retrieval using bag of visual words[C]// IAPR International Workshop on Document Analysis Systems. 2012: 297-301. |
[16] | DATAR M , IMMORLICA N , INDYK P ,et al. Locality-sensitive hashing scheme based on p-stable distributions[C]// Twentieth Symposium on Computational Geometry,ACM, 2004: 253-262. |
[17] | TIPPING M E , BISHOP C M . Probabilistic principal component analysis[J]. Journal of the Royal Statistical Society Series B (Statistical Methodology), 1999,61(3): 611-622. |
[18] | JOLLIFFE I T . Principal component analysis[J]. Journal of Marketing Research, 2002,87(100):513. |
[19] | HSU C Y , LU C S , PEI S C . Image feature extraction in encrypted domain with privacy-preserving SIFT[J]. IEEE Trans Image Processing, 2012,21(11): 4593-4607. |
[20] | WANG S M , NASSAR M , ATALLAH M ,et al. Secure and private outsourcing of shape-based feature extraction[M]. Information and Communications Security. Springer International Publishing, 2013: 90-99. |
[21] | LI Y M , ZHOU J T , CHENG A ,et al. SIFT keypoint removal and injection via convex relaxation[J]. IEEE Transactions on Information Forensics &Security, 2016,11(8): 1722-1735. |
[22] | WANG Q , HU S S , REN K ,et al. Catch me in the dark:effective privacy-preserving outsourcing of feature extractions over image data[C]// IEEE International Conference on Computer Communications(INFOCOM). 2016: 1-9. |
[23] | HU S S , WANG Q , WANG J J ,et al. SecSIFT:privacy-preserving outsourcing computation of feature extractions over encrypted image data[J]. IEEE Transactions on Image Processing, 2016,25(7): 3411-3425. |
[24] | WONG W K , CHEUNG D W , KAO B ,et al. Secure KNN computation on encrypted databases[C]// ACM Sigmod International Conference on Management of Data. 2009: 139-152. |
[25] | 卓力, 龙海霞, 彭远帆 ,等. 加密域图像处理综述[J]. 北京工业大学学报, 2016,42(2): 174-183. |
ZHUO L , LONG H X , PENG Y F ,et al. Image processing in encrypted domain:a comprehensive survey[J]. Journal of Beijing University of Technology, 2016,42(2): 174-183. | |
[26] | FONTAINE C , GALAND F . A survey of homomorphic encryption for nonspecialists[J]. Eurasip Journal on Information Security, 2007,2007(1): 1-10. |
[27] | PAILLIER P , POINTCHEVAL D . Efficient public-key cryptosystems provably secure against active adversaries[C]// International Conference on the Theory and Applications of Cryptology and Information Security:Advances in Cryptology. Springer-Verlag, 1999: 165-179 |
[28] | MATTON S , MOURET G , BOCQUET R ,et al. Sub-image homomorphic filtering technique for improving facial identification under difficult illumination conditions[C]// International Conference on Systems,Signals & Image Processing,Iwssip, 2006: 439-473. |
[29] | LI L , EL-LATIF A A , NIU X . Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images[J]. Signal Processing, 2012,92(4): 1069-1078. |
[30] | LU W J , VARNA A L , WU M . Confidentiality-preserving image search:a comparative study between homomorphic encryption and distance-preserving randomization[J]. IEEE Access, 2014,2: 125-141. |
[31] | ZHANG Y , ZHUO L , PENG Y ,et al. A secure image retrieval method based on homomorphic encryption for cloud computing[C]// International Conference on Digital Signal Processing. IEEE, 2014: 269-274. |
[32] | BELLAFQIRA R , COATRIEUX G , BOUSLIMI D ,et al. Content-based image retrieval in homomorphic encryption domain[C]// International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2015: 2944-2947. |
[33] | QUELLEC G , LAMARD M , CAZUGUEL G ,et al. Wavelet optimization for content-based image retrieval in medical databases[J]. Medical Image Analysis, 2010,14(2): 227-241. |
[34] | BELLAFQIRA R , COATRIEUX G , BOUSLIMI D ,et al. An end to end secure CBIR over encrypted medical database[C]// Engineering in Medicine and Biology Society. IEEE, 2016:2537. |
[35] | AHMED E D H , KALASH H M , ALLAH O S F . An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption[J]. Informatica, 2007,31(1): 121-129. |
[36] | TONG X J , CUI M G . Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation[J]. Science China(Information Sciences), 2010,53(1): 191-202. |
[37] | LU W J , VARNA A L , SWAMINATHAN A ,et al. Secure image retrieval through feature protection[C]// IEEE International Conference on Acoustics,Speech and Signal Processing. IEEE, 2009: 1533-1536. |
[38] | XIA Z H , ZHU Y , SUN X ,et al. A similarity search scheme over encrypted cloud images based on secure transformation[J]. International Journal of Future Generation Communication & Networking, 2013,6(6): 71-80. |
[39] | XIA Z H , XIONG N N , VASILAKOS A V ,et al. EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J]. Information Sciences, 2017,387: 195-204. |
[40] | FURUKAWA J , . Request-based comparable encryption[C]// European Symposium on Research in Computer Security. Springer Berlin Heidelberg, 2013: 129-146 |
[41] | FURUKAWA J , . Short comparable encryption[C]// International Conference on Cryptology and Network Security. Springer,Cham, 2014: 337-352. |
[42] | AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[C]// ACM SIGMOD IntConf on Management of Data. 2004: 563-574. |
[43] | LEE S , PARK T J , LEE D ,et al. Chaotic order preserving encryption for efficient and secure queries on databases[J]. IEICE Transactions on Information and Systems, 2009,92(11): 2207-2217. |
[44] | BOLDYREVA A , CHENETTE N , LEE Y ,et al. Order-preserving symmetric encryption[C]// International Conference on Advances in Cryptology-eurocrypt, 2009: 224-241. |
[45] | LIU D X , WANG S L . Nonlinear order preserving index for encrypted database query in service cloud environments[J]. Concurrency & Computation Practice & Experience, 2013,25(13): 1967-1984. |
[46] | GAO Y Q , MIAO M X , WANG J F ,et al. Secure approximate nearest neighbor search over encrypted data[C]// IntConf on Broad band & Wireless Computing. IEEE, 2015: 578-583. |
[47] | POPA R A , REDFIELD C M S , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// ACM Symposium on Operating Systems Principles 2011,Cascais,Portugal,DBLP, 2011: 85-100. |
[48] | TANG Q , . Privacy preserving mapping schemes supporting comparison[C]// 2010 ACM Workshop on Cloud Computing Security Workshop. 2010: 53-58. |
[49] | CHEN P , YE J , CHEN X F . Efficient request-based comparable encryption scheme based on sliding window method[J]. Soft Computing, 2016,20(11): 4589-4596. |
[50] | ZOU Q , WANG J F , YE J ,et al. Efficient and secure encrypted image search in mobile cloud computing[J]. Soft Computing, 2017,21(11): 2959-2969. |
[51] | LU W J , SWARMINATHAN A , VARNA A ,et al. Enabling search over encrypted multimedia databases[C]// Media Forensics and Security. International Society for Optics and Photonics, 2009: 725411-725418. |
[52] | YAO A C , . How to generate and exchange secrets[C]// Foundations of Computer Science,Symposium on. IEEE, 2008: 162-167. |
[53] | 申立艳, 陈小军, 时金桥 ,等. 隐私保护集合交集计算技术研究综述[J]. 计算机研究与发展, 2017,54(10): 2153-2169. |
SHEN L Y , CHEN X J , SHI J Q ,et al. Survey on private preserving set intersection technology[J]. Journal of Computer Research and Development, 2017,54(10): 2153-2169. | |
[54] | LINDELL Y , PINKAS B . A proof of security of yao’s protocol for two-party computation[J]. Journal of Cryptology, 2009,22(2): 161-188. |
[55] | HUANG Y , EVANS D , KATZ J ,et al. Faster secure two-party computation using garbled circuits[C]// Usenix Conference on Security. USENIX Association, 2011: 35-35. |
[56] | ZHANG L , JUNG T , FENG P ,et al. PIC:enable large-scale privacy preserving content-based image search on cloud[C]// International Conference on Parallel Processing. IEEE, 2015: 1-1. |
[57] | SHEN M , CHENG G , ZHE L ,et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation[J]. Future Generation Computer Systems, 2018: 1-13. |
[58] | JUNG T , LI X Y , WAN M . Collusion-tolerable privacy-preserving sum and product calculation without secure channel[J]. Journal of Cryptology, 2015,12(1): 45-57. |
[59] | FERREIRA B , RODRIGUES J , LEITAO J ,et al. Towards an image encryption scheme with content-based image retrieval properties[J]. Lecture Notes in Computer Science, 2015: 311-318. |
[60] | CHENG H , ZHANG X , YU J ,et al. Encrypted JPEG image retrieval using block-wise feature comparison[J]. Journal of Visual Communication & Image Representation, 2016,40: 111-117. |
[61] | CHENG H , ZHANG X , YU J . AC-coefficient histogram-based retrieval for encrypted JPEG images[J]. Multimedia Tools and Applications, 2015,75(21): 13791-13803. |
[62] | 韩威, 申铭, 徐彦彦 ,等. 一种云环境下JPEG图像的安全检索方法[J]. 计算机应用研究, 2017(4): 1239-1243. |
HAN W , SHEN M , XU Y Y ,et al. Secure JPEG image retrieval method under cloud environment[J]. Application Research of Computers, 2017(4): 1239-1243. | |
[63] | HUANG K , XU M , FU S J ,et al. Efficient privacy-preserving content-based image retrieval in the cloud[C]// International Conference on Web-Age Information Management. Springer Inter-national Publishing, 2016: 28-39. |
[64] | HUANG Y , ZHANG J , PAN L ,et al. Privacy protection in interactive content based image retrieval[J]. IEEE Transactions on Dependable & Secure Computing, 2018: 1-1. |
[65] | ZHU Y , SUN X M , XIA Z H ,et al. Enabling similarity search over encrypted images in cloud[J]. Information Technology Journal, 2014,13(5): 824-831. |
[66] | ZHU Y , SUN X M , XIA Z H ,et al. Secure similarity search over encrypted cloud images[J]. International Journal of Security & Its Applications, 2015,9(8): 1-14. |
[67] | XIA Z H , ZHU Y , SUN X M ,et al. Towards privacy-preserving content-based image retrieval in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015,6(1): 276-286. |
[68] | XIA Z H , WANG X H , ZHANG L G ,et al. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing[J]. IEEE Transactions on Information Forensics & Security, 2016,11(11): 2594-2608. |
[1] | 陈赛特, 李卫海, 姚远志, 俞能海. 轻量级K匿名增量近邻查询位置隐私保护算法[J]. 网络与信息安全学报, 2023, 9(3): 60-72. |
[2] | 肖敏, 毛发英, 黄永洪, 曹云飞. 基于属性签名的车载网匿名信任管理方案[J]. 网络与信息安全学报, 2023, 9(2): 33-45. |
[3] | 许建龙, 林健, 黎宇森, 熊智. 分布式用户隐私保护可调节的云服务个性化QoS预测模型[J]. 网络与信息安全学报, 2023, 9(2): 70-80. |
[4] | 袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案[J]. 网络与信息安全学报, 2023, 9(2): 143-153. |
[5] | 孙哲, 宁洪, 殷丽华, 方滨兴. 基于教学实训靶场的“数据隐私保护”课程建设初探[J]. 网络与信息安全学报, 2023, 9(1): 178-188. |
[6] | 白雪, 秦宝东, 郭瑞, 郑东. 基于SM2的两方协作盲签名协议[J]. 网络与信息安全学报, 2022, 8(6): 39-51. |
[7] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[8] | 卢晨昕, 陈兵, 丁宁, 陈立全, 吴戈. 具有紧凑标签的基于身份匿名云审计方案[J]. 网络与信息安全学报, 2022, 8(6): 156-168. |
[9] | 明盛智, 朱建明, 隋智源, 张娴. 信息增值机制下在线医疗隐私保护策略[J]. 网络与信息安全学报, 2022, 8(6): 169-177. |
[10] | 张娴, 朱建明, 隋智源, 明盛智. 数字货币交易匿名性与监管的博弈分析[J]. 网络与信息安全学报, 2022, 8(5): 150-157. |
[11] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[12] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
[13] | 张伟成, 卫红权, 刘树新, 普黎明. 5G移动边缘计算场景下的快速切换认证方案[J]. 网络与信息安全学报, 2022, 8(3): 154-168. |
[14] | 周艺华, 扈新宇, 李美奇, 杨宇光. 云环境下基于属性策略隐藏的可搜索加密方案[J]. 网络与信息安全学报, 2022, 8(2): 112-121. |
[15] | 陈前昕, 毕仁万, 林劼, 金彪, 熊金波. 支持多数不规则用户的隐私保护联邦学习框架[J]. 网络与信息安全学报, 2022, 8(1): 139-150. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|