scispace - formally typeset
Open AccessJournal ArticleDOI

Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization

Reads0
Chats0
TLDR
This paper focuses on comparing these two major paradigms of techniques, namely, homomorphic encryption-based techniques and feature/index randomization- based techniques, for confidentiality-preserving image search, and develops novel and systematic metrics to quantitatively evaluate security strength in this unique type of data and applications.
Abstract
Recent years have seen increasing popularity of storing and managing personal multimedia data using online services. Preserving confidentiality of online personal data while offering efficient functionalities thus becomes an important and pressing research issue. In this paper, we study the problem of content-based search of image data archived online while preserving content confidentiality. The problem has different settings from those typically considered in the secure computation literature, as it deals with data in rank-ordered search, and has a different security-efficiency requirement. Secure computation techniques, such as homomorphic encryption, can potentially be used in this application, at a cost of high computational and communication complexity. Alternatively, efficient techniques based on randomizing visual feature and search indexes have been proposed recently to enable similarity comparison between encrypted images. This paper focuses on comparing these two major paradigms of techniques, namely, homomorphic encryption-based techniques and feature/index randomization-based techniques, for confidentiality-preserving image search. We develop novel and systematic metrics to quantitatively evaluate security strength in this unique type of data and applications. We compare these two paradigms of techniques in terms of their search performance, security strength, and computational efficiency. The insights obtained through this paper and comparison will help design practical algorithms appropriate for privacy-aware cloud multimedia systems.

read more

Citations
More filters
Journal ArticleDOI

Security and Privacy in Cloud Computing

TL;DR: Significant research and development efforts in both industry and academia aim to improve the cloud's security and privacy.
Journal ArticleDOI

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

TL;DR: A scheme that supports CBIR over the encrypted images without revealing the sensitive information to the cloud server is proposed and the security and efficiency of the proposed scheme are shown.
Journal ArticleDOI

Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy

TL;DR: An image color coding method aimed at increasing the security of keyframes extracted from diagnostic hysteroscopy videos using video summarization using a 2-D logistic map, which relies on mixing and cascading the orbits of the chaotic map in order to generate the stream keys for the encryption algorithm.
Journal ArticleDOI

A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing

TL;DR: This paper proposes a novel lightweight framework for privacy-preserving CNN feature extraction for mobile sensing based on edge computing that allows us to significantly reduce the latency and the overhead of the end devices while preserving privacy.
Proceedings ArticleDOI

SEISA: Secure and efficient encrypted image search with access control

TL;DR: A lightweight secure image search scheme over encrypted data, namely SEISA is proposed, which only increases about 9% search cost and sacrifices about 3% on search accuracy, and a secure k-means outsourcing algorithm that significantly saves the data owner's cost is designed.
References
More filters
Journal ArticleDOI

Distinctive Image Features from Scale-Invariant Keypoints

TL;DR: This paper presents a method for extracting distinctive invariant features from images that can be used to perform reliable matching between different views of an object or scene and can robustly identify objects among clutter and occlusion while achieving near real-time performance.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Book ChapterDOI

Differential privacy

TL;DR: In this article, the authors give a general impossibility result showing that a formalization of Dalenius' goal along the lines of semantic security cannot be achieved, and suggest a new measure, differential privacy, which, intuitively, captures the increased risk to one's privacy incurred by participating in a database.
Related Papers (5)