2020
DOI: 10.1109/access.2020.2983194
|View full text |Cite
|
Sign up to set email alerts
|

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing

Abstract: With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image retrieval services are very expensive in terms of computing and storage. Therefore, outsourcing services to the cloud server is a good choice for image owners. However, privacy protection can become a big issue for image owners because the cloud server can only be semi-trusted. In this paper, we propose a novel image retrieval scheme. It is a ciphertext image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…In addition, some secret information is shared between the image owner and users [4], [11]. In contrast, in the second approach, descriptors are directly extracted from encrypted images without decryption by cloud providers [5], [12]- [16], and the image owner has no secret information that should be shared with users. The proposed scheme corresponds to this approach.…”
Section: A Privacy-preserving Content-based Image Retrievalmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, some secret information is shared between the image owner and users [4], [11]. In contrast, in the second approach, descriptors are directly extracted from encrypted images without decryption by cloud providers [5], [12]- [16], and the image owner has no secret information that should be shared with users. The proposed scheme corresponds to this approach.…”
Section: A Privacy-preserving Content-based Image Retrievalmentioning
confidence: 99%
“…The proposed scheme corresponds to this approach. Bag-of-visual words (BOVW) model-based [5], [12], [15]- [18] and JPEG-based [13], [14] schemes are also in this approach.…”
Section: A Privacy-preserving Content-based Image Retrievalmentioning
confidence: 99%
“…In the second approach, descriptors are directly extracted from encrypted images by a cloud provider as well as for plain images [12]- [17], where each data owner only encrypts images. In addition, data owners and users do not need to share keys.…”
Section: ) Generating Descriptors From Encrypted Imagesmentioning
confidence: 99%
“…The proposed retrieval scheme corresponds to this approach. Schemes [12]- [17] are carried out the basis on this approach. Some schemes [15], [16] consider compressing images with JPEG, but their retrieval performance will be degraded due to the difference in coding parameters used for JPEG compression.…”
Section: ) Generating Descriptors From Encrypted Imagesmentioning
confidence: 99%
“…With the application of computer vision and digital devices, image processing is more and more widely used in medical images [1], [2], image super-resolution [3], [4], remote sensing images [5], and other fields such as social applications [6], [7]. Nowadays, benefiting from the rapid development of image processing, people can get access to image resources quickly.…”
Section: Introductionmentioning
confidence: 99%