Journal on Communications ›› 2019, Vol. 40 ›› Issue (2): 31-39.doi: 10.11959/j.issn.1000-436x.2019023

• Papers • Previous Articles     Next Articles

Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user

Xiangyu WANG1,2,Jianfeng MA1,2,Yinbin MIAO1   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 Shaanxi Key Laborary of Network and System Security,Xidian University,Xi’an 710071,China
  • Revised:2018-07-26 Online:2019-02-01 Published:2019-03-04
  • Supported by:
    The Key Program of NSFC Grant(U1405255);The Shaanxi Science & Technology Coordination & Innovation Project(2016TZC-G-6-3);The National Natural Science Foundation of China(61702404)

Abstract:

The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.

Key words: content-based image retrieval, multi-user, privacy-preserving, key conversion protocol

CLC Number: 

No Suggested Reading articles found!