Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (4): 14-28.doi: 10.11959/j.issn.2096-109x.2019035
• Special Column:Researches on Key Technologies of Privacy Protection and Its Innovative Applications • Previous Articles Next Articles
Ying WU1,Xuan LI1,2,3(),Biao JIN1,Rongrong JIN1
Revised:
2019-01-08
Online:
2019-08-15
Published:
2019-08-20
Supported by:
CLC Number:
Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval[J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28.
"
方案 | 特征/索引 | 加密算法 | 相似性度量算法 |
Zhang[ | 低级特征→局部保留投影 | Paillier | 欧氏距离→MSB |
Bellafqira[ | 小波子带直方图 | Paillier | L1距离 |
Lu[ | 视觉特征 | 平面随机化 | 汉明距离 |
随机投影 | L1距离 | ||
随机化一元编码 | L1距离 | ||
Shen[ | SIFT特征 | Jung[ | 欧氏距离→SMC |
Ferreira[ | 颜色/纹理 | 像素行位移 | 汉明距离 |
Cheng[ | DCT系数直方图 | DCT系数置乱 | 曼哈顿距离 |
Han[ | DCT系数差分特征→LBP | DCT系数置乱 | 曼哈顿距离 |
Huang[ | VLAD | Wong[ | 内积计算 |
Huang[ | PoV | 类混淆 | SVM分类器 |
Zou[ | SIFT特征→LSH | 比较加密 | 欧式距离 |
Zhu[ | LSH | AES | 内积计算 |
Zhu[ | LSH | 安全线性规划转换 | EMD距离 |
Xia[ | LSH | Wong[ | 内积计算 |
[1] | KAMARA S , LAUTER K . Cryptographic cloud storage[C]// International Conference on Financial Cryptography and Data Security,Berlin:Springer Berlin Heidelberg, 2010. 136-149. |
[2] | LEON P , UR B , SHAY R ,et al. Why Johnny can't opt out:a usability evaluation of tools to limit online behavioral advertising[C]// Sigchi Conference on Human Factors in Computing Systems, 2012: 589-598. |
[3] | NAIMIA I , WESTREICH D J . Big data:a revolution that will transform how we live,work,and think[J]. Mathematics & Computer Education, 2014,47(17): 181-183. |
[4] | LAGENDIJK R L , BARNI M . Encrypted signal processing for privacy protection:conveying the utility of homomorphic encryption and multiparty computation[J]. IEEE Signal Processing Magazine, 2013,30(1): 82-105. |
[5] | RUPA C , . Privacy preservation of ROI of medical image using squint pixel and PLSB hiding technique[C]// International Conference on Virtual System & Multimedia. IEEE, 2017: 1-5. |
[6] | DUFAUX F . Video scrambling for privacy protection in video surveillance - recent results and validation framework[J]. Proceedings of SPIE-The International Society for Optical Engineering, 2011,8063: 307-314. |
[7] | GUDIVADA V N , RAGHAVAN V V . Content based image retrieval systems[J]. Computer, 1995,28(9): 18-22. |
[8] | SMITH J R , CHANG S F . Tools and techniques for color image retrieval[J]. Proc.of SPIE(The International Society for Optical Engineering) 1996, 2670: 32-42. |
[9] | JAIN A K , VAILAYA A . Image retrieval using color and shape[J]. Pattern Recognition, 1996,29(8): 1233-1244. |
[10] | DUNN D , HIGGINS W E , WAKELEY J . Texture segmentation using 2D Gabor elementary functions[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1994,16(2): 0-149. |
[11] | MANJUNATH B S , MA W Y . Texture features for browsing and retrieval of image data[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1996,18(8): 837-842. |
[12] | LOWE D G . Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004,60(2): 91-110. |
[13] | JEGOU H , DOUZE M , SCHMID C ,et al. Aggregating local descriptors into a compact image representation[C]// IEEE Conference on Computer Vision and Pattern Recognition. 2010: 3304-3311. |
[14] | YANG B , CHEN S . A comparative study on local binary pattern (LBP) based face recognition:LBP histogram versus LBP image[J]. Neurocomputing, 2013,120(10): 365-379. |
[15] | SHEKHAR R , JAWAHAR C V . Word image retrieval using bag of visual words[C]// IAPR International Workshop on Document Analysis Systems. 2012: 297-301. |
[16] | DATAR M , IMMORLICA N , INDYK P ,et al. Locality-sensitive hashing scheme based on p-stable distributions[C]// Twentieth Symposium on Computational Geometry,ACM, 2004: 253-262. |
[17] | TIPPING M E , BISHOP C M . Probabilistic principal component analysis[J]. Journal of the Royal Statistical Society Series B (Statistical Methodology), 1999,61(3): 611-622. |
[18] | JOLLIFFE I T . Principal component analysis[J]. Journal of Marketing Research, 2002,87(100):513. |
[19] | HSU C Y , LU C S , PEI S C . Image feature extraction in encrypted domain with privacy-preserving SIFT[J]. IEEE Trans Image Processing, 2012,21(11): 4593-4607. |
[20] | WANG S M , NASSAR M , ATALLAH M ,et al. Secure and private outsourcing of shape-based feature extraction[M]. Information and Communications Security. Springer International Publishing, 2013: 90-99. |
[21] | LI Y M , ZHOU J T , CHENG A ,et al. SIFT keypoint removal and injection via convex relaxation[J]. IEEE Transactions on Information Forensics &Security, 2016,11(8): 1722-1735. |
[22] | WANG Q , HU S S , REN K ,et al. Catch me in the dark:effective privacy-preserving outsourcing of feature extractions over image data[C]// IEEE International Conference on Computer Communications(INFOCOM). 2016: 1-9. |
[23] | HU S S , WANG Q , WANG J J ,et al. SecSIFT:privacy-preserving outsourcing computation of feature extractions over encrypted image data[J]. IEEE Transactions on Image Processing, 2016,25(7): 3411-3425. |
[24] | WONG W K , CHEUNG D W , KAO B ,et al. Secure KNN computation on encrypted databases[C]// ACM Sigmod International Conference on Management of Data. 2009: 139-152. |
[25] | 卓力, 龙海霞, 彭远帆 ,等. 加密域图像处理综述[J]. 北京工业大学学报, 2016,42(2): 174-183. |
ZHUO L , LONG H X , PENG Y F ,et al. Image processing in encrypted domain:a comprehensive survey[J]. Journal of Beijing University of Technology, 2016,42(2): 174-183. | |
[26] | FONTAINE C , GALAND F . A survey of homomorphic encryption for nonspecialists[J]. Eurasip Journal on Information Security, 2007,2007(1): 1-10. |
[27] | PAILLIER P , POINTCHEVAL D . Efficient public-key cryptosystems provably secure against active adversaries[C]// International Conference on the Theory and Applications of Cryptology and Information Security:Advances in Cryptology. Springer-Verlag, 1999: 165-179 |
[28] | MATTON S , MOURET G , BOCQUET R ,et al. Sub-image homomorphic filtering technique for improving facial identification under difficult illumination conditions[C]// International Conference on Systems,Signals & Image Processing,Iwssip, 2006: 439-473. |
[29] | LI L , EL-LATIF A A , NIU X . Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images[J]. Signal Processing, 2012,92(4): 1069-1078. |
[30] | LU W J , VARNA A L , WU M . Confidentiality-preserving image search:a comparative study between homomorphic encryption and distance-preserving randomization[J]. IEEE Access, 2014,2: 125-141. |
[31] | ZHANG Y , ZHUO L , PENG Y ,et al. A secure image retrieval method based on homomorphic encryption for cloud computing[C]// International Conference on Digital Signal Processing. IEEE, 2014: 269-274. |
[32] | BELLAFQIRA R , COATRIEUX G , BOUSLIMI D ,et al. Content-based image retrieval in homomorphic encryption domain[C]// International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2015: 2944-2947. |
[33] | QUELLEC G , LAMARD M , CAZUGUEL G ,et al. Wavelet optimization for content-based image retrieval in medical databases[J]. Medical Image Analysis, 2010,14(2): 227-241. |
[34] | BELLAFQIRA R , COATRIEUX G , BOUSLIMI D ,et al. An end to end secure CBIR over encrypted medical database[C]// Engineering in Medicine and Biology Society. IEEE, 2016:2537. |
[35] | AHMED E D H , KALASH H M , ALLAH O S F . An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption[J]. Informatica, 2007,31(1): 121-129. |
[36] | TONG X J , CUI M G . Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation[J]. Science China(Information Sciences), 2010,53(1): 191-202. |
[37] | LU W J , VARNA A L , SWAMINATHAN A ,et al. Secure image retrieval through feature protection[C]// IEEE International Conference on Acoustics,Speech and Signal Processing. IEEE, 2009: 1533-1536. |
[38] | XIA Z H , ZHU Y , SUN X ,et al. A similarity search scheme over encrypted cloud images based on secure transformation[J]. International Journal of Future Generation Communication & Networking, 2013,6(6): 71-80. |
[39] | XIA Z H , XIONG N N , VASILAKOS A V ,et al. EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J]. Information Sciences, 2017,387: 195-204. |
[40] | FURUKAWA J , . Request-based comparable encryption[C]// European Symposium on Research in Computer Security. Springer Berlin Heidelberg, 2013: 129-146 |
[41] | FURUKAWA J , . Short comparable encryption[C]// International Conference on Cryptology and Network Security. Springer,Cham, 2014: 337-352. |
[42] | AGRAWAL R , KIERNAN J , SRIKANT R ,et al. Order preserving encryption for numeric data[C]// ACM SIGMOD IntConf on Management of Data. 2004: 563-574. |
[43] | LEE S , PARK T J , LEE D ,et al. Chaotic order preserving encryption for efficient and secure queries on databases[J]. IEICE Transactions on Information and Systems, 2009,92(11): 2207-2217. |
[44] | BOLDYREVA A , CHENETTE N , LEE Y ,et al. Order-preserving symmetric encryption[C]// International Conference on Advances in Cryptology-eurocrypt, 2009: 224-241. |
[45] | LIU D X , WANG S L . Nonlinear order preserving index for encrypted database query in service cloud environments[J]. Concurrency & Computation Practice & Experience, 2013,25(13): 1967-1984. |
[46] | GAO Y Q , MIAO M X , WANG J F ,et al. Secure approximate nearest neighbor search over encrypted data[C]// IntConf on Broad band & Wireless Computing. IEEE, 2015: 578-583. |
[47] | POPA R A , REDFIELD C M S , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// ACM Symposium on Operating Systems Principles 2011,Cascais,Portugal,DBLP, 2011: 85-100. |
[48] | TANG Q , . Privacy preserving mapping schemes supporting comparison[C]// 2010 ACM Workshop on Cloud Computing Security Workshop. 2010: 53-58. |
[49] | CHEN P , YE J , CHEN X F . Efficient request-based comparable encryption scheme based on sliding window method[J]. Soft Computing, 2016,20(11): 4589-4596. |
[50] | ZOU Q , WANG J F , YE J ,et al. Efficient and secure encrypted image search in mobile cloud computing[J]. Soft Computing, 2017,21(11): 2959-2969. |
[51] | LU W J , SWARMINATHAN A , VARNA A ,et al. Enabling search over encrypted multimedia databases[C]// Media Forensics and Security. International Society for Optics and Photonics, 2009: 725411-725418. |
[52] | YAO A C , . How to generate and exchange secrets[C]// Foundations of Computer Science,Symposium on. IEEE, 2008: 162-167. |
[53] | 申立艳, 陈小军, 时金桥 ,等. 隐私保护集合交集计算技术研究综述[J]. 计算机研究与发展, 2017,54(10): 2153-2169. |
SHEN L Y , CHEN X J , SHI J Q ,et al. Survey on private preserving set intersection technology[J]. Journal of Computer Research and Development, 2017,54(10): 2153-2169. | |
[54] | LINDELL Y , PINKAS B . A proof of security of yao’s protocol for two-party computation[J]. Journal of Cryptology, 2009,22(2): 161-188. |
[55] | HUANG Y , EVANS D , KATZ J ,et al. Faster secure two-party computation using garbled circuits[C]// Usenix Conference on Security. USENIX Association, 2011: 35-35. |
[56] | ZHANG L , JUNG T , FENG P ,et al. PIC:enable large-scale privacy preserving content-based image search on cloud[C]// International Conference on Parallel Processing. IEEE, 2015: 1-1. |
[57] | SHEN M , CHENG G , ZHE L ,et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation[J]. Future Generation Computer Systems, 2018: 1-13. |
[58] | JUNG T , LI X Y , WAN M . Collusion-tolerable privacy-preserving sum and product calculation without secure channel[J]. Journal of Cryptology, 2015,12(1): 45-57. |
[59] | FERREIRA B , RODRIGUES J , LEITAO J ,et al. Towards an image encryption scheme with content-based image retrieval properties[J]. Lecture Notes in Computer Science, 2015: 311-318. |
[60] | CHENG H , ZHANG X , YU J ,et al. Encrypted JPEG image retrieval using block-wise feature comparison[J]. Journal of Visual Communication & Image Representation, 2016,40: 111-117. |
[61] | CHENG H , ZHANG X , YU J . AC-coefficient histogram-based retrieval for encrypted JPEG images[J]. Multimedia Tools and Applications, 2015,75(21): 13791-13803. |
[62] | 韩威, 申铭, 徐彦彦 ,等. 一种云环境下JPEG图像的安全检索方法[J]. 计算机应用研究, 2017(4): 1239-1243. |
HAN W , SHEN M , XU Y Y ,et al. Secure JPEG image retrieval method under cloud environment[J]. Application Research of Computers, 2017(4): 1239-1243. | |
[63] | HUANG K , XU M , FU S J ,et al. Efficient privacy-preserving content-based image retrieval in the cloud[C]// International Conference on Web-Age Information Management. Springer Inter-national Publishing, 2016: 28-39. |
[64] | HUANG Y , ZHANG J , PAN L ,et al. Privacy protection in interactive content based image retrieval[J]. IEEE Transactions on Dependable & Secure Computing, 2018: 1-1. |
[65] | ZHU Y , SUN X M , XIA Z H ,et al. Enabling similarity search over encrypted images in cloud[J]. Information Technology Journal, 2014,13(5): 824-831. |
[66] | ZHU Y , SUN X M , XIA Z H ,et al. Secure similarity search over encrypted cloud images[J]. International Journal of Security & Its Applications, 2015,9(8): 1-14. |
[67] | XIA Z H , ZHU Y , SUN X M ,et al. Towards privacy-preserving content-based image retrieval in cloud computing[J]. IEEE Transactions on Cloud Computing, 2015,6(1): 276-286. |
[68] | XIA Z H , WANG X H , ZHANG L G ,et al. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing[J]. IEEE Transactions on Information Forensics & Security, 2016,11(11): 2594-2608. |
[1] | Qianxin CHEN, Renwan BI, Jie LIN, Biao JIN, Jinbo XIONG. Privacy-preserving federated learning framework with irregular-majority users [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 139-150. |
[2] | Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU. Efficient and secure multi-user outsourced image retrieval scheme with access control [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 29-39. |
[3] | Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN. Study on privacy preserving encrypted traffic detection [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 101-113. |
[4] | Zijian BAO,Qinghao WANG,Yongxin ZHANG,Bin WANG,Ning LU,Wenbo SHI. Regulatory Bitcoin privacy-preserving mixing service [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 40-51. |
[5] | Ying LI, Chunguang MA. Overview of searchable encryption research [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21. |
[6] | Jian-qiong HE,You-liang TIAN,Kai ZHOU. Provably secure social network privacy-preserving scheme [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 62-67. |
[7] | Ming-jie MA,Yue-jin DU,Feng-hua LI,IUJia-wen L. Review of semantic-based privacy-preserving approaches in LBS [J]. Chinese Journal of Network and Information Security, 2016, 2(12): 1-11. |
[8] | Xing-shu CHEN,Long GE,Yong-gang LUO,Xiang LI. Research on continuous monitoring of cloud computing service [J]. Chinese Journal of Network and Information Security, 2016, 2(10): 1-7. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|