2020
DOI: 10.1016/j.future.2018.04.089
|View full text |Cite
|
Sign up to set email alerts
|

Content-based multi-source encrypted image retrieval in clouds with privacy preservation

Abstract: Content-based image retrieval (CBIR) is one of the fundamental image retrieval primitives. Its applications can be found in various areas, such as art collections and medical diagnoses. With an increasing prevalence of cloud computing paradigm, image owners desire to outsource their images to cloud servers. In order to deal with the risk of privacy leakage of images, images are typically encrypted before they are outsourced to the cloud, which makes CBIR an extremely challenging task. Existing studies focus on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 86 publications
(17 citation statements)
references
References 27 publications
0
17
0
Order By: Relevance
“…Qin et al [20] proposed an encrypted image retrieval approach in the cloud computing environment, which employs the improved Harris algorithm and Local Sensitive Hash (LSH) to retrieve encrypted images. Shen et al [21] proposed a secure content-based image retrieval method, which uses a secure multiparty computation technique to encrypt image features. Cheng et al [4] proposed an encrypted JPEG image retrieval scheme based on the Markov process, which uses encryption to encrypt DCT coefficients to protect the confidentiality of the JPEG image content.…”
Section: Related Workmentioning
confidence: 99%
“…Qin et al [20] proposed an encrypted image retrieval approach in the cloud computing environment, which employs the improved Harris algorithm and Local Sensitive Hash (LSH) to retrieve encrypted images. Shen et al [21] proposed a secure content-based image retrieval method, which uses a secure multiparty computation technique to encrypt image features. Cheng et al [4] proposed an encrypted JPEG image retrieval scheme based on the Markov process, which uses encryption to encrypt DCT coefficients to protect the confidentiality of the JPEG image content.…”
Section: Related Workmentioning
confidence: 99%
“…Plenty of approaches [12][13][14] have been proposed to enhance image privacy while preserving image operation privileges. These approaches focus on search efficiency optimization and image security-enhancing, but they are limited to a single centralized server strategy so that they cannot solve the problem of the server outage.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, decryption processing within the cloud will reveal original images to unauthorized parties, such as cloud provider companies. Consequently, data processing based on encrypted information is promising and has become critical [15][16][17][18][19][20][21][22][23][24]. Image data are typically large, and image encryption with methods, such as data encryption standard (DES) or advanced encryption standard (AES), may be timeconsuming and unsuitable for low-computing devices, with limited power and computation capability, in IoT systems.…”
Section: Introductionmentioning
confidence: 99%