With the development of the imaging devices, such as digital cameras, smartphones, and medical imaging equipments, our world has been witnessing a tremendous growth in quantity, availability, and importance of images. The needs of efficient image storage and retrieval services are reinforced by the increase of large-scale image databases among all kinds of areas. Compared with text documents, images consume much more storage space. Hence, its maintenance is considered to be a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In order to secure the data in cloud, the proposed system supports CBIR over encrypted images without leaking the sensitive information to the cloud server. Firstly, feature vectors are extracted to represent the corresponding images. After that, the pre-filter tables are constructed by locality-sensitive hashing to increase search efficiency. Moreover, the feature vectors are protected by the secure kNN algorithm, and image pixels are encrypted by a standard stream cipher. In addition, considering the case that the authorized query users may illegally copy and distribute the retrieved images to someone unauthorized, a watermark-based protocol is used to deter such illegal distributions. In watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. Hence, when an illegal image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
R.Santhi,Dr.D.Yuvaraj.(2017).Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption.International Journal of Computer Engineering In Research Trends,4(6),231-235.Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6003.pdf
1. Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren, â€œA Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computingâ€ IEEE TRANSCATION ON INFORMATION FORENSIC AND SECURITY, VOL.11, NO. 11, NOVEMBER 2016.
2. B. Ferreira, J. Rodrigues, J. LeitËœao, and H. Domingos, â€œPrivacypreserving content-based image retrieval in the cloud,â€ arXiv preprint arXiv:1411.4862, 2014.
3. A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, â€œA provably secure anonymous buyerâ€“seller watermarking protocol,â€ Information Forensics and Security, IEEE Transactions on, vol. 5, no. 4, pp. 920â€“ 931, 2010.
4. Carson, C., Thomas, M., Belongie, S., Hellerstein, J. M. and Malik, J. 1999. Blobworld: A system for region-based image indexing and retrieval. In Proceedings of the Third International Conference on Visual Information and Information Systems, Springer-Verlag, London, UK. 509-516.
5. C. Wang, K. Ren, S. Yu, and K. M. R. Urs, â€œAchieving usable and privacy-assured similarity search over outsourced cloud data,â€ in Proc. of INFOCOM. IEEE, 2012, pp. 451â€“459.
6. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, â€œPublic key encryption with keyword search,â€ in Advances in Cryptology-Eurocrypt. Springer, 2004, pp. 506â€“522.
7. S. Anto, S. Chandramathi,â€ An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis,â€, International Journal of Computer Engineering In Research Trends, 2(7):437-443, 2015.
8. F. Long, H. J. Zhang, and D. D. Feng, "Fundamentals of Content-based Image Retrieval," in Multimedia Information Retrieval and Management, D. Feng Eds,Springer, 2003.
9. Shivangi Jindal, Harkiran Kaur, â€œIntensification of Resolution in the Realm of
Digital Imaging,â€ International Journal of Computer Engineering In Research Trends, 3(6):343-346,2016.
10. J. C. Bezdek, â€œPattern Recognition with Fuzzy Objective Function Algorithmsâ€, New York: Plenum Press, 1981.
11. Ma, W. and Manjunath, B.S. (1999) NeTra: a toolbox for navigating large image databases. Multimedia Systems, Springer-Verlag, Berlin, Germany. 7(3), 184-198.
12. Nbhan D. Salih , David Chek Ling Ngo, â€œ A novel method for shape representation,â€ GVIP 05 Conference, 19-21 December 2005.
13. Ravichandran K. and Ananthi B., â€œColor Skin Segmentation Using K-Means Cluster, â€ International Journal of Computational and Applied Mathematics, vol.4, no.2, pp. 153-157 , 2009.
14. Rui, Y., Huang, T. S. and Mehrotra, S. 1997. Content-based image retrieval with relevance feedback in MARS. In Proceedings of International Conference on Image Processing. 2, 815-818.
15. S. Lian, Z. Liu, R. Zhen, and H. Wang, â€œCommutative watermarking and encryption for media data,â€ Optical Engineering, vol. 45, no. 8, pp. 080 510â€“080 510, 2006.
16. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, â€œPrivacypreserving multi-keyword text search in the cloud supporting similaritybased ranking,â€ in Proc. of 8th ACM SIGSAC symposium on Information, computer and communications security.
17. Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, â€œMutual verifiable provable data auditing in public cloud storage,â€ Journal of Internet Technology, vol. 16, no. 2, pp. 317â€“323, 2015.
18. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, â€œEnabling personalized search over encrypted outsourced data with efficiency improvement,â€ IEEE Transactions on Parallel & Distributed Systems, vol. PP, no. Online, pp. 1â€“1, 2015.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.