Back to Current Issues

Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption

R.Santhi , Dr.D.Yuvaraj,

Affiliations
Computer Science and Engineering, M.I.E.T Engineering College, Trichy
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]


Abstract
With the development of the imaging devices, such as digital cameras, smartphones, and medical imaging equipments, our world has been witnessing a tremendous growth in quantity, availability, and importance of images. The needs of efficient image storage and retrieval services are reinforced by the increase of large-scale image databases among all kinds of areas. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In order to secure the data in cloud, the proposed system supports CBIR over encrypted images without leaking the sensitive information to the cloud server. Firstly, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, a watermark-based protocol is used to deter such illegal distributions. In watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when an illegal image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.


Citation
R.Santhi,Dr.D.Yuvaraj.(2017).Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption.International Journal of Computer Engineering In Research Trends,4(6),231-235.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6003.pdf


Keywords : CBIR (Content-Based Image Retrieval), kNN algorithm, watermark, encrypted image.

References
1.	Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren, “A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing” IEEE TRANSCATION ON INFORMATION FORENSIC AND SECURITY, VOL.11, NO. 11, NOVEMBER 2016.

2.	B. Ferreira, J. Rodrigues, J. Leit˜ao, and H. Domingos, “Privacypreserving content-based image retrieval in the cloud,” arXiv preprint arXiv:1411.4862, 2014.

3.	A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, “A provably secure anonymous buyer–seller watermarking protocol,” Information Forensics and Security, IEEE Transactions on, vol. 5, no. 4, pp. 920– 931, 2010.

4.	Carson, C., Thomas, M., Belongie, S.,   Hellerstein, J. M. and Malik, J. 1999. Blobworld: A system for region-based image indexing and retrieval. In Proceedings of the Third International Conference on Visual Information and Information Systems, Springer-Verlag, London, UK. 509-516. 
5.	C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,” in Proc. of INFOCOM. IEEE, 2012, pp. 451–459.

6.	D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt. Springer, 2004, pp. 506–522.

7.	S. Anto, S. Chandramathi,” An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis,”, International Journal of Computer Engineering In Research Trends, 2(7):437-443, 2015.

8.	F. Long, H. J. Zhang, and D. D. Feng, "Fundamentals of Content-based Image Retrieval," in Multimedia Information Retrieval and Management, D. Feng Eds,Springer, 2003.

9.	Shivangi Jindal, Harkiran Kaur, “Intensification of Resolution in the Realm of
Digital Imaging,” International Journal of Computer Engineering In Research Trends, 3(6):343-346,2016.
10.	J. C. Bezdek, “Pattern Recognition with Fuzzy Objective Function Algorithms”, New York: Plenum Press, 1981. 

11.	Ma, W. and Manjunath, B.S. (1999) NeTra: a toolbox for navigating large image databases. Multimedia Systems, Springer-Verlag, Berlin, Germany. 7(3), 184-198. 

12.	Nbhan D. Salih , David Chek Ling Ngo, “ A novel method for shape representation,”  GVIP 05 Conference, 19-21 December 2005.

13.	Ravichandran K. and Ananthi B., “Color Skin Segmentation Using K-Means Cluster,  ” International Journal of Computational and Applied Mathematics, vol.4, no.2, pp. 153-157 , 2009.

14.	Rui, Y., Huang, T. S. and Mehrotra, S. 1997. Content-based image retrieval with relevance feedback in MARS. In Proceedings of International Conference on Image Processing. 2, 815-818. 

15.	S. Lian, Z. Liu, R. Zhen, and H. Wang, “Commutative watermarking and encryption for media data,” Optical Engineering, vol. 45, no. 8, pp. 080 510–080 510, 2006.

16.	W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking,” in Proc. of 8th ACM SIGSAC symposium on Information, computer and communications security.
17.	Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable   data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317–323, 2015.

18.	Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel & Distributed Systems, vol. PP, no. Online, pp. 1–1, 2015.


DOI Link : Not yet assigned

Download :
  V4I6003.pdf


Refbacks : Currently There are no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>