BOEW A Content Based Image Retrieval Scheme Using Bag of Encrypted Words in Cloud Computing
BOEW A Content Based Image Retrieval Scheme Using Bag of Encrypted Words in Cloud Computing
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 1
Abstract—Content-based Image Retrieval (CBIR) techniques have been extensively studied with the rapid growth of digital images.
Generally, CBIR service is quite expensive in computational and storage resources. Thus, it is a good choice to outsource CBIR
service to the cloud server that is equipped with enormous resources. However, the privacy protection becomes a big problem, as the
cloud server cannot be fully trusted. In this paper, we propose an outsourced CBIR scheme based on a novel bag-of-encrypted-words
(BOEW) model. The image is encrypted by color value substitution, block permutation, and intra-block pixel permutation. Then, the
local histograms are calculated from the encrypted image blocks by the cloud server. All the local histograms are clustered together,
and the cluster centers are used as the encrypted visual words. In this way, the bag-of-encrypted-words (BOEW) model is built to
represent each image by a feature vector, i.e., a normalized histogram of the encrypted visual words. The similarity between images
can be directly measured by the Manhattan distance between feature vectors on the cloud server side. Experimental results and
security analysis on the proposed scheme demonstrate its search accuracy and security.
F
1 I NTRODUCTION
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 2
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 3
3 S YSTEM OVERVIEW AND PRELIMINARIES of the visual words. Specifically, the BOW model has three
3.1 System model steps:
(i) Local feature extraction. The first step is to extract
Similar to [28], the proposed scheme involves two types of
local features from the images in database. Some typical
entities, i.e., the image owner and the cloud server, as shown
local features include SIFT [36] and SURF [37], which are
in Fig. 1.
invariant to illumination, deformation, and rotation. As the
Image owner has a large-scale image database, I =
development of cloud computing, some researchers have
{Ii }ni=1 with the corresponding identity set ID = {IDi }ni=1 ,
designed several secure SIFT feature extraction methods
to be outsourced for cost saving and convenient utilization.
which can calculate the SIFT features from the particularly
To preserve privacy, the image database needs to be encrypt-
encrypted images. However, the extracted features are also
ed before being uploaded, generating an encrypted image
the encrypted ones and cannot be directly employed for
set C = {Ci }n i=1 . Besides the image encryption, the image the image retrieval [38], [39]. For efficiency and security, we
owner would like to outsource the computation and storage
calculate the color histograms from the image blocks as local
tasks to the cloud server as much as possible.
features.
After storing the images on the cloud server, the image
(ii) Vocabulary construction. The second step is to con-
owner may want to retrieve the desired images which are
struct the vocabulary. Typically, k -means method can be
similar to a query image. In the query phase, the image
employed to cluster the local features into k classes. The
owner in our scheme needs only to encrypt the query
cluster centers are defined as visual words. The full set of
image and then uploads it. The feature extraction and search
the visual words constitute the vocabulary.
operation are finished by the cloud server. (iii) Histogram calculation. The last step is to calculate
Cloud server stores the encrypted images for the image the histogram of visual words. Please note that, all the
owner and provides CBIR service for the image owner. In local features are represented by their nearest cluster centers
addition to the search operation, the cloud server in our (visual words). Finally, each image is represented by a k -bins
scheme also takes charge of the index generation. histogram of visual words.
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 4
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 5
Input: Image I and secret keys {keyv ∗ }∗∈{H,S,V } Input: I ′′ , ID, {keyp ∗ }∗∈{H,S,V } , blksize
Output: I ′ Output: C
1: Generate the secret permutations pmtv H,# , pmtv S,# , 1: Denote the final encrypted image as C whose compo-
and pmtv V,# , where # ∈ {1, ..., Npmt } ; nents are denoted as CH , CS , and CV . Divide the com-
2: Generate three random sequences sqntH , sqntV , sqntS . ponents CH , CS , and CV into non-overlapping blocks
c
The length of sequences are equal to the pixel amount denoted by blkH , blkSc , and blkVc ;
of the image I and the elements of these sequences are 2: Divide the components of image I ′′ into non-
′′
within the set [1, ..., Npmt ]; overlapping blocks denoted by blkH , blkS′′ , and blkV′′ ;
3: Denote pi as ith pixel in image I , and pi H , pi S , pi V as 3: for ∀∗ ∈ H, S, V do
the three components of the pixel; 4: for ∀ blk ′′ ∗j ∈ blk∗′′ do
4: Denote p′i as the corresponding pixel in the encrypted 5: Generate the secret permutation for j -th block
image I ′ , and p′iH , p′iS , p′iV as the three components of blk ′′ ∗j as pmtp ∗j ;
′′
the pixel; 6: for ∀ blk∗j [i] ∈ blk ′′ ∗j do
5: for each p′i ∈ I ′ do 7: blk ∗j [i] ← blk ′′ ∗j [pmtp∗j [i]];
c
6: p′iH ← pmtv H,sqntH [i] [pi H ], p′iS ← 8: end for
′
pmtv S,sqntS [i] [pi S ], piV ← pmtv V,sqntV [i] [pi V ] 9: end for
7: end for 10: end for
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 6
can be directly calculated. Finally, the θ most similar images of the color information and texture information,
are returned to the image owner as the search results. both of which are contained in all H, S, V compo-
nents. In our scheme, this information is protect-
4.2.6 Image decryption ed respectively by the substitutions and random
Iq ← ImgDec(Rq , K, blksize). The decryption process is an permutations. Specifically, the color information in
exact reverse to the encryption process. Firstly, the intra- H, S, V components are protected by color value
block pixel permutation is reversed. Secondly, the block per- substitution with different secret keys. The color
mutation is reversed. Finally, the color value permutation is information between the real images and simulated
recovered. Here, we do not describe the decryption process ones are indistinguishable according to the property
in detail because it is quite straightforward. of random permutation. For a random permutation
with length of 101, the computational complexity of
4.2.7 Image update a distinguisher D, executed by S , in distinguishing
Idx ← ImgUpdate(Idx, ID, TD, updatetype). When the the color values is 101! because D needs to figure
owner needs to add an image, he encrypts the image and out the correct one from 101! permutations, which
submits the encrypted image and the ID to the cloud server. means a log2 (101!) ≈ 531 bits security strength. The
The server generates the corresponding feature vector as the texture information is protected by block permuta-
trapdoor generation process and adds the pair of image ID tion and intra-block pixel permutations. The secu-
and feature vector to the index. When an image needs to be rity strengths of block permutation and intra-block
deleted, the image owner just notices the server to delete the pixel permutations are equal to log2 (blknum!) and
encrypted image and the corresponding item in the index. log2 (blksize!) bits, respectively. The image content
is made up of all of these information and hence
the security strength of image encryption (SecImg )
5 S ECURITY ANALYSIS in our scheme can be calculated as:
As stated in subsection 3.2, we consider an honest-but-
curious cloud server which follows the protocol correctly, SecImg =3 × Npmt × log2 (101!)
but may analyze the owner’s data to acquire privacy in-
+log2 (blknum!) (4)
formation such as the content of encrypted images and the
image features. The security of the scheme is analyzed under +3 × blknum × log2 (blksize!)(bits)
the ciphertext-only attack (COA), known-background attack • Security of features. In our scheme, image features are
(KBA), and chosen-plaintext attack (CPA) models. calculated from the local histograms of encrypted
color values. In addition, the adversary can obtain
5.1 Security under COA model the encrypted global histogram of an image if he
In the COA model, the adversary is only able to get the wants. With a simulated image I S , S can calculate
ciphertext. For formal statement, the functionality F and the the local and global histograms of the simulated im-
corresponding information leakages of our scheme under age. The computational complexity of a distinguisher
the COA model are summarized in Fig. 3. Our security D in distinguishing the histogram is 3 × Npmt × 101!
proofs follow the paradigm in secure multi-party com- which means a 3 × Npmt × 531 bits security strength.
putations [44]. The execution of our scheme involves the • Security of query image. In our scheme, query image
interaction between cloud server and image owner, which is is encrypted in the same way as images on cloud
defined as the real experiment. In the proposed scheme, the server. Thus the security strength equals to SecImg .
honest-but-curious cloud server is the potential adversary In this scheme, the images are encrypted by the combi-
A. In an ideal experiment, a simulator S is defined as the nation of value substitution, block permutation, and intra-
one that can simulate the view of adversary A by using the block pixel permutation. The image can be well protected,
functionality F only, constructing the ideal experiment. The although the security is related to the image size. Despite
proposed scheme is proved secure once the two experiments the proposed image encryption method cannot be the best
are indistinguishable. one in terms of security, we would like to point that our en-
cryption method is designed to support the direct extraction
Theorem 1. Our scheme is secure against an honest-but-
of features from encrypted images for image retrieval.
curious probabilistic polynomial time (PPT) adversary under
the COA model. The security strength depends on the image
size, block size, and the number of permutations in color value 5.2 Security under KBA model
encryption. In the KBA model, besides the information leakage de-
fined in Fig. 3, the adversary also knows certain statistical
Proof.
properties of natural images, which degrades the security
• Security of image content. The simulator S simulates strength of the proposed scheme. For example, as illustrated
a set of images I S and the corresponding identity in the first subfigure of Fig. 4, color values do not occur
set IDS according to the storage leakage as shown uniformly, and the adjacent color values have the similar
in Fig. 3. The simulator S knows the total number occurrence probabilities. After the encryption with a single
of images and the size of each image. However, S permutation, the histogram bins have been shuffled, which
can only fill the images with the randomly generated protects the image statistical features to some extent. How-
pixels. As stated in subsection 4.2, images consist ever, the distribution statistics are still reserved as shown in
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 7
the second subfigure of Fig. 4, which decreases the compu- 5.4 Access pattern
tational complexity to figure out the secret permutation. In Access pattern is a high-lever privacy compared with the
our scheme, the polyalphabetic cipher is utilized to encrypt data confidentiality. The consequences caused by access pat-
the pixel values, which will flatten the color value histogram tern leakage depend on the application scenario. In an image
of the encrypted image and thus offering stronger security retrieval scheme, the cloud server knows which images
[40], [41]. In this paper, we calculate the histogram entropies are retrieved by the image owner by analyzing the access
of an original image and its encrypted versions generated pattern. Generally, the researchers do not consider the access
using different number of permutations Npmt as shown in pattern leakage in the design of an SSE scheme [3], [4], [9],
Fig. 5. The higher entropy is received with larger Npmt , [12], [13], [14], [15], [16], [17], [18], [19], [21], [22], [24], [25],
which indicates higher uniformity, i.e., better security [40], [29], [30], [31].
[41]. However, there is a trade-off between the security and Oblivious RAM techniques have been researched for
retrieval accuracy, which will be shown in next section. many years to deal with access pattern leakage, but usually
suffers to huge computation and communication burdens
5.3 Security under CPA model [47], [48]. It is possible to incorporate Oblivious RAM tech-
In the CPA model, besides the information leakage defined niques into the SE scheme to mitigate the access pattern
in Fig. 3, the adversary can obtain the ciphertexts of ar- leakage. But the computation and communication burdens
bitrary plaintexts. In fact, all the permutation-only image are big problems for the image retrieval.
ciphers can be completely broken by the chosen-plaintext
attack if images are encrypted by the same secret key 6 E XPERIMENTAL RESULTS
[45]. But in our scheme, the images are encrypted by the
This section evaluates the performance of the proposed
combination of position permutation and pixel substitution.
scheme in terms of encryption effectiveness, retrieval ac-
The secret keys of position permutation are distinct for each
curacy, and efficiency. We implement the proposed scheme
image. In addition, the pixel position is not shuffled by
with MatLab 2017a on a Win-10 operation system with Intel
rows and columns which significantly degrades the security
Core (TM) i7-6900K CPU 3.20 GHz and 64 GB memory.
[45]. Thus, the images encrypted in our scheme cannot be
Inria Holidays database [49] is used as the experiment
recovered even under the CPA model. However, in order to
database which contains 1491 color images (2.65 GB) in
support the image retrieval, the secret key of the color value
500 categories. Inria Holidays database provides a Python
substitution is the same for all images, and this secret key
evaluation package to calculate mAP and was used in
is unsafe under the CPA model [46]. This will cause infor-
privacy-preserving image retrieval schemes [4], [26], which
mation leakage about image content. With the secret key of
facilitates performance comparison. For clarity, we symbol-
color value substitution, the cloud server can generate the
ize several important parameters as shown in Table 2.
valid trapdoor for the query image chosen by itself. Then,
the cloud server can search the encrypted image database
with the trapdoor, and all the retrieved images may contain 6.1 Effectiveness of image encryption
the similar content with the chosen query image. In this way, In our scheme, the images are encrypted by color value sub-
the cloud server can figure out the image content to some stitution, block permutation, and intra-block pixel permuta-
extent. tion. Fig. 6 illustrates the separate and joint effect of the three
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 8
8.2
Original image 8
0.1
Ratio
7.8
0.05
Entropy
0 7.6
0 50 100 150 200 250 300
7.4
Npmt=1
0.1 7.2
Ratio
0.05 7
0
0 50 100 150 200 250 300 6.8
1 2 3 4 5 10 20 50 100 200 500
Npmt=5 N
pmt
0.1
Ratio
0.05
0 Fig. 5: Entropies of global histograms of encrypted images
0 50 100 150 200 250 300 using different Npmt .
Npmt=10
0.1 TABLE 2: Symbol of parameters
Ratio
0.05
0 Parameters Symbol
0 50 100 150 200 250 300
Size of block blksize
Npmt=20
0.1 Number of cluster centers k
Ratio
0.05
0
0 50 100 150 200 250 300 6.2 Retrieval accuracy
Npmt=100 In our experiment, mean average precision (mAP) is used to
0.1 measure the retrieval accuracy. The Python evaluation pack-
Ratio
0.05 blksize and k . Next, we test our scheme with different Npmt
0 as the larger Npmt can protect the image content better but
0 50 100 150 200 250 300
may decrease the retrieval accuracy.
Values in HSV components
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 9
blksize
k
15 × 15 20 × 20 25 × 25 50 × 50 100 × 100 200 × 200 Average
100 0.57095 0.57713 0.57907 0.57099 0.55027 0.50554 0.55899
500 0.62097 0.62816 0.63544 0.62718 0.60810 0.56265 0.61375
1000 0.63398 0.63161 0.62967 0.63117 0.60523 0.58453 0.61937
2000 0.63473 0.62966 0.63059 0.63280 0.61689 0.57699 0.62028
3000 0.63080 0.64244 0.63613 0.63039 0.60846 0.57851 0.62112
4000 0.62960 0.63583 0.63647 0.64002 0.62398 0.58542 0.62522
5000 0.63293 0.63715 0.63510 0.63089 0.62129 0.57146 0.62147
8000 0.63170 0.63626 0.64046 0.63771 0.62205 0.59026 0.62641
Average 0.62321 0.62728 0.62787 0.62514 0.60703 0.56942 0.61333
TABLE 4: The mAPs of two previous schemes and our scheme in different color spaces
Schemes BOEW-HSV BOEW-YUV BOEW-RGB IES [4] SSE [13] reported in [4] Partial-encryption based scheme [26]
mAP 0.64244 0.62641 0.61107 0.54564 0.49075 0.5604
degrade the retrieval accuracy. Here, we set blksize = block. It takes blknumT × O(blksize) time for the
20 × 20 and k = 3000 and test the retrieval accuracy with local histogram calculation. Table 7 shows more time
different Npmt . As shown in Fig. 7, the accuracy does not is consumed with a smaller blksize to extract local
decrease a lot when we increase Npmt up to 50. histogram from the whole Inria holiday database.
• Time consumption of local histogram clustering. In our
6.3 Efficiency implementation, the built-in k -means function in
In this section, we present the time consumptions of image MatLab is used to cluster the local histograms. The
encryption, index generation, and search operation. time cost of the k -means algorithm depends on the
predefined number of class k , the number of used
6.3.1 Time consumption of image encryption local features blknumU , and the number of itera-
In the proposed scheme, it takes O(imgsize) time for color tions t. The time complexity of k -means algorithm
value substitution, O(blknum) for block permutation, and is O(k × blknumU × t). In our experiment, we set
blknum × O(blksize) for intra-block pixel permutation to the maximal iteration times to be 300. When we set
encrypt an image. In this paper, we separately test the blksize to be 20 × 20, it generates 17,099,758 local
time consumptions of color value substitution with different histograms from Inria Holiday database. Our scheme
Npmt and time consumptions of pixel position permutation runs out of memory (64GB) when we use all of these
(including block and intra-block permutations) with differ- local histograms. Thus, in this experiment, we only
ent blksize, which are listed in Table 5 and 6. As listed in use a part of local histograms to generate the cluster
Table 5, it does not increase time consumption a lot to use centers.
multiple color value permutations, but as listed in Table 6, At first, we set a similar blknumU for different
more time is consumed with smaller blksize in the position blksize so as to figure out proper parameters blksize
permutations. The image encryption is very time consum- and k that obtain good retrieval accuracies. In Ta-
ing. However, the proposed image encryption method is ble 8, we list the total number of local histograms
much more efficient than some standard encryption meth- blknumT when different blksize are set. We also list
ods. For example, it takes 548.29s to encrypt the first image the number of used local histograms blknumU in
(3942KB) in Inria Holidays database using DES. Note that clustering. Finally, the time consumption of cluster-
the previous outsourced CBIR schemes [13], [14], [15], [17], ing with different blksize and k are given in Table
[18], [19], [21], [22], [24], [25] need to encrypt images and 8. Next, the influence of blknumU on our scheme
upload encrypted ones to the cloud server, which is also is tested when blksize is set to 20 × 20 as shown
quite time-consuming. in Table 9. Table 8 and 9 shows that more time
is consumed with larger blknumU and k . Table 9
6.3.2 Time consumption of index generation shows that the retrieval accuracy does not decrease
In the proposed scheme, feature generation includes three a lot even though a very small part (1/5000) of local
steps, local histogram calculation, clustering of local his- histograms are used for clustering.
tograms, and generation of feature vectors. The time con- • Time consumption of feature generation. After histogram
sumptions of these steps are separately tested. clustering, a normalized histogram of the encrypted
words is calculated from each image as the feature
• Time consumption of local histogram calculation. In the vector. The time complexity of feature vector calcula-
proposed scheme, the cloud server divides the im- tion is O(blknumT ×k) for the entire image database.
ages into blocks and extracts a histogram from each
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 10
TABLE 6: Time consumptions in block and intra-block permutations with different blksize
TABLE 8: Time consumptions in the clustering with different blksize and k (s)
blksize
15 × 15 20 × 20 25 × 25 50 × 50 100 × 100 200 × 200
blknumT 30406710 17099758 10887924 2707247 671176 158828
blknumU 76844 171252 170763 169546 167916 158828
blknumU/blknumT 1/400 1/100 1/64 1/16 1/4 1
100 88.11 226.64 445.03 310.68 447.44 415.88
500 219.19 659.61 880.04 707.60 597.67 559.11
1000 231.34 872.96 862.16 836.25 859.65 791.93
2000 306.92 1158.16 1095.38 1119.35 1087.68 988.78
k
3000 329.95 1431.94 1421.01 1359.65 1348.08 1252.13
4000 382.25 1684.34 1573.37 1599.92 1570.11 1500.51
5000 431.61 1915.47 1904.63 1843.33 1806.84 1694.72
8000 576.66 2625.00 2591.51 2538.60 2523.75 2362.38
The time consumption of global feature generation under the proposed BOEW model. It depends on how the
for Inria Holiday dataset with different parameters intra-block pixels are processed and encrypted. For exam-
are listed in Table 10. ple, one may extract and encrypt the gradient information
from image blocks as local features. The utilization of texture
6.3.3 Time consumption of searching information may achieve better retrieval accuracy. However,
With the linear index, it needs to search on the whole index the information leakage is a problem to solve. Secondly,
to find the θ most similar images. The time complexity of our scheme is constructed on the basis of uncompressed
search is O(k × n). In our scheme, the length of feature images. Storage consumption could be a practical problem.
vector equals to the number of cluster center k . Table 11 According to [3], [4], the encrypted image can also be
lists the searching time of our schemes with different k . The compressed to reduce the storage cost despite the correla-
results are averaged from 500 queries. tion among the pixels is destroyed. We do not discuss the
image compression a lot in this paper. Finally, it could be a
6.4 Discussion meaningful work to apply the BOEW model to the retrieval
The proposed scheme is robust to parameters. It achieves of encrypted JPEG images.
a good retrieval accuracy as long as we choose blksize in
the range of 15 × 15 to 100 × 100 and k in range [500, 7 C ONCLUSIONS
8000]. In addition, our scheme can get a satisfying retrieval In this paper, a novel privacy-preserving CBIR scheme is
accuracy even though a very small part of local histograms proposed. A novel bag-of-encrypted-words (BOEW) model
are used for clustering. Compared to the previous privacy- is designed to achieve a good retrieval accuracy. As a case
preserving CBIR schemes [13], [14], [15], [17], [18], [19], [21], study, we protect the image content by color value substitu-
[22], [24], [25], our scheme outsources the index construction tion, block permutation, and intra-block pixel permutation.
to the cloud server, which further relieves the image owner’s Local histograms are calculated as local features. k -means
burden. Compared to the scheme using the global histogram algorithm is utilized to generate encrypted visual words.
[3], [4], our scheme improve the mAP from 0.56544 to The histogram of the visual words is calculated to represent
0.64244. It is a considerable improvement. the image. The similarity between images can be directly
The proposed scheme can be improved from several measured by the Manhattan distance between feature vec-
aspects. Firstly, it is possible to extract better local features tors on the cloud server side. Besides the search operation,
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 11
TABLE 9: Performance of the proposed scheme with different number of used local histogram, blksize = 20 × 20,
blknumT = 17, 099, 758
blksize
15 × 15 20 × 20 25 × 25 50 × 50 100 × 100 200 × 200
100 301.24 109.66 67.97 23.05 14.79 11.13
500 735.27 343.93 214.13 61.94 23.32 15.15
1000 1210.27 636.99 401.51 108.95 36.44 17.85
2000 2196.60 1170.73 768.25 202.83 61.68 25.40
k
3000 3209.22 1733.15 1110.68 294.43 87.06 33.98
4000 4207.75 2299.12 1466.80 388.36 112.16 42.75
5000 5204.52 2858.70 1826.36 483.31 135.73 50.20
8000 8284.66 4546.23 2906.85 751.16 211.83 74.05
TABLE 11: Time consumptions of searching at the server side with linear index (s)
the index construction in our scheme can be also outsourced [2] C. S. Lu, “Homomorphic encryption-based secure sift for privacy-
to the cloud server. preserving feature extraction,” Proceedings of SPIE The International
Society for Optical Engineering, vol. 7880, no. 2, pp. 788 005–17, 2011.
The proposed scheme can be further improved. Firstly, [3] B. Ferreira, J. Rodrigues, J. Leitão, and H. Domingos, “Privacy-
it could be a meaningful future work to design better preserving content-based image retrieval in the cloud,” in IEEE
local descriptors under our BOEW model. Secondly, how to 34th Symposium on Reliable Distributed Systems. IEEE, 2015, pp.
protect the image content under CPA model needs further 11–20.
[4] B. Ferreira, J. Rodrigues, J. Leitao, and H. Domingos, “Practical
studies. Finally, it could be interesting to apply the BOEW privacy-preserving content-based retrieval in cloud image reposi-
model to JPEG images. tories,” IEEE Transactions on Cloud Computing, vol. PP, no. 99, pp.
1–1, 2017.
[5] Y. Rui, T. S. Huang, M. Ortega, and S. Mehrotra, “Relevance feed-
ACKNOWLEDGMENTS back: a power tool for interactive content-based image retrieval,”
IEEE Transactions on Circuits and Systems for Video Technology, vol. 8,
This work is supported in part by the National Nat- no. 5, pp. 644–655, 1998.
ural Science Foundation of China under grant num- [6] Y. Liu, D. Zhang, G. Lu, and W.-Y. Ma, “A survey of content-based
image retrieval with high-level semantics,” Pattern Recognition,
bers 61672294, 61502242, 61702276, U1536206, U1405254, vol. 40, no. 1, pp. 262–282, 2007.
61772283, 61602253, 61601236, and 61572258, in part by [7] C. B. Akgül, D. L. Rubin, S. Napel, C. F. Beaulieu, H. Greenspan,
Six peak talent project of Jiangsu Province (R2016L13), in and B. Acar, “Content-based image retrieval in radiology: current
status and future directions,” Journal of Digital Imaging, vol. 24,
part by National Key R&D Program of China under grant
no. 2, pp. 208–222, 2011.
2018YFB1003205, in part by NRF-2016R1D1A1B03933294, [8] X. Zhang, W. Liu, M. Dundar, S. Badve, and S. Zhang, “Towards
in part by the Jiangsu Basic Research Programs-Natural large-scale histopathological image analysis: Hashing-based im-
Science Foundation under grant numbers BK20150925 and age retrieval,” IEEE Transactions on Medical Imaging, vol. 34, no. 2,
pp. 496–506, 2015.
BK20151530, in part by the Priority Academic Program
[9] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable
Development of Jiangsu Higher Education Institutions (PA- symmetric encryption: Improved definitions and efficient con-
PD) fund, in part by the Collaborative Innovation Center structions,” Journal of Computer Security, vol. 19, no. 5, pp. 79–88,
of Atmospheric Environment and Equipment Technology 2011.
[10] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy
(CICAEET) fund, China. Zhihua Xia is supported by BK21+ keyword search over encrypted data in cloud computing,” in 2010
program from the Ministry of Education of Korea. Proceedings IEEE INFOCOM. IEEE, 2010, pp. 1–5.
[11] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving
multi-keyword ranked search over encrypted cloud data,” IEEE
R EFERENCES Transactions on parallel and distributed systems, vol. 25, no. 1, pp.
222–233, 2013.
[1] J. M. Lewin, R. E. Hendrick, C. J. D’Orsi, P. K. Isaacs, L. J. [12] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic
Moss, A. Karellas, G. A. Sisney, C. C. Kuni, and G. R. Cutter, multi-keyword ranked search scheme over encrypted cloud data,”
“Comparison of full-field digital mammography with screen-film IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2,
mammography for cancer detection: results of 4,945 paired exam- pp. 340–352, 2016.
inations.” Radiology, vol. 218, no. 3, pp. 873–80, 2001. [13] W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, “Enabling search
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 12
0.65
0.6
mAP
0.55
0.5
0.45
(a) (b) 1 2 3 4 5 10 20
Npmt
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSC.2019.2927215, IEEE
Transactions on Services Computing
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2018 13
formation retrieval,” IEEE Transactions on Information Forensics & Leqi Jiang is a Ph.D. student in School of
Security, vol. 10, no. 1, pp. 152–167, 2015. Computer and Software, Nanjing University of
[32] J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local fea- Information Science & Technology. He received
tures and kernels for classification of texture and object categories: his M.S. degree in Software Engineering from
A comprehensive study,” International Journal of Computer Vision, Nanchang Hangkong University in 2016. His re-
vol. 73, no. 2, pp. 213–238, 2007. search interests include encrypted image pro-
[33] D. Nister and H. Stewenius, “Scalable recognition with a vocab- cessing, data security in cloud.
ulary tree,” in Computer vision and pattern recognition, 2006 IEEE
computer society conference on, vol. 2. Ieee, 2006, pp. 2161–2168.
[34] Z. Wu, Q. Ke, J. Sun, and H.-Y. Shum, “A multi-sample, multi-
tree approach to bag-of-words image representation for image
retrieval,” in IEEE 12th International Conference on Computer Vision.
IEEE, 2009, pp. 1992–1999.
[35] J. Wang, Y. Li, Y. Zhang, C. Wang, H. Xie, G. Chen, and X. Gao,
“Bag-of-features based medical image retrieval via multiple as-
signment and visual words weighting.” IEEE Transactions on Med-
ical Imaging, vol. 30, no. 11, pp. 1996–2011, 2011.
[36] D. G. Lowe, “Distinctive image features from scale-invariant key-
points,” International Journal of Computer Vision, vol. 60, no. 60, pp.
Dandan Liu received her BS in network engi-
91–110, 2004.
neering from Nanjing University of Information
[37] H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-up robust
Science & Technology in 2015, China. She is
features (surf),” Computer vision and image understanding, vol. 110,
currently pursuing her MS in computer science
no. 3, pp. 346–359, 2008.
and technology at the College of Computer and
[38] Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient
Software, in Nanjing University of Information
privacy-preserving image feature extraction in cloud computing,”
Science & Technology, China. Her research in-
in Proceedings of the 22nd ACM International Conference on Multime-
terest is encrypted image retrieval.
dia. ACM, 2014, pp. 497–506.
[39] ——, “Secsift: Secure image sift feature extraction in cloud com-
puting,” ACM Transactions on Multimedia Computing, Communica-
tions, and Applications (TOMM), vol. 12, no. 4s, p. 65, 2016.
[40] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption
scheme based on 3d chaotic cat maps,” Chaos, Solitons & Fractals,
vol. 21, no. 3, pp. 749–761, 2004.
[41] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image
encryption algorithm using dna sequence operations,” Optics and
Lasers in engineering, vol. 88, pp. 197–213, 2017.
[42] Z. Qin, J. Yan, and K. Ren, “Private image computation: The case of
cloud based privacy-preserving sift,” in Computer Communications Lihua Lu received her BS in network engineer-
Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on. IEEE, ing from Nanjing University of Information Sci-
2014, pp. 179–180. ence & Technology in 2016, China. She is cur-
[43] K. Krishna and M. N. Murty, “Genetic k-means algorithm,” IEEE rently pursuing her MS in computer science and
Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), technology at the College of Computer and Soft-
vol. 29, no. 3, pp. 433–439, 1999. ware, in Nanjing University of Information Sci-
[44] R. Canetti, “Universally composable security: A new paradigm for ence & Technology, China. Her research interest
cryptographic protocols,” in 42nd IEEE Symposium on Foundations is encrypted image retrieval.
of Computer Science. IEEE, 2001, pp. 136–145.
[45] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, “On the security
of permutation-only image encryption schemes,” IEEE Transaction-
s on Information Forensics and Security, vol. 11, no. 2, pp. 235–246,
2016.
[46] A. Clark and E. Dawson, “A parallel genetic algorithm for crypt-
analysis of the polyalphabetic substitution cipher,” Cryptologia,
vol. 21, no. 2, pp. 129–138, 1997.
[47] B. Pinkas and T. Reinman, “Oblivious ram revisited,” in Annual
Cryptology Conference. Springer, 2010, pp. 502–519.
[48] E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li, “Oblivious ram
Byeungwoo Jeon received the B.S. degree
with o ((logn) 3) worst-case cost,” in International Conference on
(Magna Cum Laude) in 1985, the M.S. degree
The Theory and Application of Cryptology and Information Security.
in 1987 in electronics engineering from Seoul
Springer, 2011, pp. 197–214.
National University, Seoul, Korea, and the Ph.D.
[49] H. Jegou, M. Douze, and C. Schmid, “Hamming embedding
degree in electrical engineering from Purdue U-
and weak geometric consistency for large scale image search,”
niversity, West Lafayette, in 1992. Since Septem-
Computer Vision–ECCV 2008, pp. 304–317, 2008.
ber 1997, he has been with the faculty of the
School of Electronic and Electrical Engineer-
ing, Sungkyunkwan University, Korea, where he
is currently a full Professor. He has authored
many papers in the areas of video compression,
prepost processing, and pattern recognition. His research interests in-
Zhihua Xia received the BS degree in Hunan
clude multimedia signal processing, video compression, statistical pat-
City University, China and PhD degree in com-
tern recognition, and remote sensing.
puter science and technology from Hunan Uni-
versity, China, in 2006 and 2011, respectively.
He works as an associate professor in School
of Computer & Software, Nanjing University of
Information Science & Technology. His research
interests include digital forensic and encrypted
image processing. He is a member of the IEEE.
1939-1374 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.