A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images
@article{Iida2020APC, title={A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images}, author={Kenta Iida and Hitoshi Kiya}, journal={2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)}, year={2020}, pages={1436-1441} }
In this paper, we propose a novel content basedimage retrieval scheme allowing the mixed use of encrypted and plain images for the first time. In the proposed scheme, images are encrypted by a block-scrambling method developed for encryption-then-compression (EtC) systems. The encrypted images, referred to as EtC images, can be compressed with JPEG, as well as for plain images. Image descriptors used for the proposed retrieval is designed to avoid the effect of image encryption. As a result…Â
4 Citations
A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images
- Computer Science, Mathematics2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech)
- 2022
A novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images" is proposed.
Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images
- Computer Science2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech)
- 2021
A novel content based-image retrieval scheme for encryption-then-compression (EtC) images is proposed to maintain a high retrieval performance, even under the mixed-use of lossless- and lossy-compressed EtC images.
A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated from Independent Plain-Image Dataset
- Computer Science2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
- 2021
A privacy-preserving image-retrieval scheme using a codebook generated by using a plain-image dataset to maintain a high retrieval performance, even if code books are generated from a plain image dataset independent of image owners' encrypted images.
Privacy-preserving content-based image retrieval in edge environment
- Computer ScienceClust. Comput.
- 2022
A privacy-preserving content-based image retrieval scheme in edge environment that not only protects data privacy, but also has low communication overhead and delay as well as low computing complexity, therefore it is more suitable for edge computing environment.
References
SHOWING 1-10 OF 34 REFERENCES
A Content-based Image Retrieval Scheme Using Compressible Encrypted Images
- Computer Science, Mathematics2020 28th European Signal Processing Conference (EUSIPCO)
- 2021
A novel content based-image retrieval scheme using compressible encrypted images, called encryption-then-compression (EtC) images, which allows us not only to directly retrieve images from visually protected images, but also to make the sensitive management of secret keys unnecessary.
An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services
- Computer Science, Mathematics2019 IEEE International Conference on Image Processing (ICIP)
- 2019
An image identification scheme that aims to identify encrypted JPEG images that are generated from an original JPEG image that has been proposed for Encryptionthen-Compression systems with JPEG compression and feature vectors robust against JPEG compression.
AC-coefficient histogram-based retrieval for encrypted JPEG images
- Computer ScienceMultimedia Tools and Applications
- 2015
A novel retrieval scheme for encrypted JPEG images where the DC and AC coefficients of JPEG images are encrypted using a stream cipher and scrambling encryption, respectively, and the encrypted images are transmitted to and stored in a server, which can also provide retrieval service.
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2019
A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit the images…
An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing
- Computer ScienceIEEE Access
- 2019
The experimental results show that compared with the existing encryption retrieval schemes, the proposed retrieval scheme not only reduces the time consumption but also improves the image retrieval accuracy.
Markov Process Based Retrieval for Encrypted JPEG Images
- Computer Science, Mathematics2015 10th International Conference on Availability, Reliability and Security
- 2015
The proposed scheme can preserve file compliance and file size for encrypted JPEG images, while providing privacy-preserving image retrieval, based on Markov process.
Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks
- Computer Science, MathematicsIEEE Access
- 2019
A novel pixel-based image encryption method that maintains important features of original images and is robust against ciphertext-only attacks (COAs) and data augmentation in the encrypted domain is proposed for privacy-preserving DNNs.
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
- Computer ScienceInf. Sci.
- 2017
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing
- Computer ScienceIEEE Access
- 2020
A ciphertext image retrieval method based on random mapping features with the bag-of-words model, which uses the histogram of encrypted visual words as the feature vector to represent each image.
Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems
- Computer ScienceAPSIPA Transactions on Signal and Information Processing
- 2019
Abstract A novel grayscale-based block scrambling image encryption scheme is presented not only to enhance security, but also to improve the compression performance for Encryption-then-Compression…