scispace - formally typeset
Open AccessJournal ArticleDOI

Intelligent and Secure Content-Based Image Retrieval for Mobile Users

TLDR
An IND-CPA secure CBIR framework that performs image retrieval on the cloud without the user’s constant interaction is proposed and implemented and a secure image similarity scoring protocol is proposed, which enables the cloud servers to compare two images without knowing any information about their deep features.
Abstract
With the tremendous growth of smart mobile devices, the Content-Based Image Retrieval (CBIR) becomes popular and has great market potentials. Secure image retrieval has attracted considerable interests recently due to users' security concerns. However, it still suffers from the challenges of relieving mobile devices of excessive computation burdens, such as data encryption, feature extraction, and image similarity scoring. In this paper, we propose and implement an IND-CPA secure CBIR framework that performs image retrieval on the cloud without the user's constant interaction. A pre-trained deep CNN model, i.e., VGG-16, is used to extract the deep features of an image. The information about the neural network is strictly concealed by utilizing the lattice-based homomorphic scheme. We implement a real number computation mechanism and a divide-and-conquer CNN evaluation protocol to enable our framework to securely and efficiently evaluate the deep CNN with a large number of inputs. We further propose a secure image similarity scoring protocol, which enables the cloud servers to compare two images without knowing any information about their deep features. The comprehensive experimental results show that our framework is efficient and accurate.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

The knowledge complexity of interactive proof-systems

TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies arc not made or distributed for direct commercial advantage.
Journal ArticleDOI

An application of metadata-based image retrieval system for facility management

TL;DR: The authors conclude that the proposed metadata-based image retrieval system can ultimately enhance the better-informed decision-making process through rapid information retrieval.
Journal ArticleDOI

Secure content based image retrieval for mobile users with deep neural networks in the cloud

TL;DR: A secure CBIR framework that performs image retrieval on the cloud without the user’s interaction is proposed and a set of protocols for the secure evaluation of the non-linear functions in DNNs is designed and implemented.
Posted Content

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing.

TL;DR: This paper proposes a series of additive secure computing protocols on numbers and matrices with better efficiency, and shows their application in PPCBIR, and extracts CNN features, decrease the dimension of features and build the index securely with the help of these protocols.
Posted Content

MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing.

TL;DR: JES-MSIR is proposed, namely a novel JPEG image Encryption Scheme which is made for Multi-Source content-based Image Retrieval and can support the requirements of MSPPIR, including the constant-rounds secure retrieval from multiple sources and the union of multiple sources for better retrieval services.
References
More filters
Proceedings Article

ImageNet Classification with Deep Convolutional Neural Networks

TL;DR: The state-of-the-art performance of CNNs was achieved by Deep Convolutional Neural Networks (DCNNs) as discussed by the authors, which consists of five convolutional layers, some of which are followed by max-pooling layers, and three fully-connected layers with a final 1000-way softmax.
Proceedings Article

Very Deep Convolutional Networks for Large-Scale Image Recognition

TL;DR: In this paper, the authors investigated the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting and showed that a significant improvement on the prior-art configurations can be achieved by pushing the depth to 16-19 layers.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Book ChapterDOI

The knowledge complexity of interactive proof-systems

TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies arc not made or distributed for direct commercial advantage.
Proceedings ArticleDOI

Leveled) fully homomorphic encryption without bootstrapping

TL;DR: A novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions, using some new techniques recently introduced by Brakerski and Vaikuntanathan (FOCS 2011).
Related Papers (5)