Unlock instant, AI-driven research and patent intelligence for your innovation.

A Privacy-Preserving Multi-Source Encrypted Image Retrieval Method

A technology for encrypting images and protecting privacy, which is applied in still image data retrieval, metadata still image retrieval, electrical components, etc., and can solve problems such as image similarity information leakage

Active Publication Date: 2021-09-10
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the method, a new image similarity measurement method is proposed, which solves the problem of image similarity information leakage on the cloud server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Multi-Source Encrypted Image Retrieval Method
  • A Privacy-Preserving Multi-Source Encrypted Image Retrieval Method
  • A Privacy-Preserving Multi-Source Encrypted Image Retrieval Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] This embodiment describes the system model during the implementation of a privacy-protected multi-source encrypted image retrieval method of the present invention, such as figure 1 shown.

[0062] from figure 1It can be seen that there are multiple image owners, and they respectively outsource the encrypted image set and encrypted image feature set to cloud services for storage and retrieval, and at the same time they will send the image encryption key to KMC for storage through a secure channel; The authorized user will submit an encrypted query to the cloud service, and decrypt the encrypted result set ReCRes returned by the cloud service to obtain the original result set Res. At the same time, the authorized user will send the encrypted image key of this query to KMC; in order to improve the retrieval efficiency, the cloud service will establish a retrieval index based on the encrypted image data outsourced by the image owners. To further protect the privacy inform...

Embodiment 2

[0066] This embodiment describes the image similarity and image retrieval results during the implementation of a multi-source encrypted image retrieval method supporting privacy protection described in the present invention, such as Figure 4 with Figure 5 shown.

[0067] Figure 4 is the percentage of real similar images in the corresponding position range of the result set; Figure 5 is the F1 index of the search result.

[0068] Such as Figure 4 As shown, when using Euclidean distance to measure image similarity, the proportion of real similar images distributed in the first 10% is very large, and along with the increase of the result set range, the distribution percentage of real images is lower; when using the proposed method of the present invention When the distance Dis measures image similarity, the distribution of real similar images in the result set is uniform, and the cloud server cannot judge the similarity information in the image from the result; The F1 i...

Embodiment 3

[0070] This embodiment specifically expounds how the present invention can be used to implement a secure image retrieval outsourcing function and to implement a multi-source image retrieval function based on encrypted images.

[0071] The image owner will encrypt the image according to step 1.1 before outsourcing the image. Suppose the image collection BCollection j One of the images in is (in order to illustrate the image encryption process, it is assumed that the image size is 9×9, in practice it depends on the size of the specific image):

[0072] B ji ={b j1 ,b j2 ,b j3 ,b j4 ,b j5 ,b j6 ,b j7 ,b j8 ,b j9}={30,23,45,236,89,70,66,51,198}

[0073] Image owner j will first generate an image encryption key, assuming the generated key is:

[0074] K j ={k j1 ,k j2 ,k j3 ,k j4 ,k j5 ,k j6 ,k j7 ,k j8 ,k j9}={187,253,56,78,12,45,68,99,100}

[0075] Then the encrypted image can be calculated as:

[0076]

[0077] For all images in the image set, the imag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a multi-source encrypted image retrieval method supporting privacy protection, which belongs to the technical field of encrypted image retrieval. In the present invention, the idea of ​​secure multi-party computing is used to encrypt image features. The image owner outsources the image and image features encrypted with his own private key to the cloud server, and the cloud server performs encryption in the encrypted image library according to the encrypted query submitted by the user. Retrieve and return encrypted search results to the query user. The present invention can solve the problem of image privacy protection when multiple image owners outsource images to the cloud for retrieval. In the present invention, there is no need to communicate keys between image owners and users, which reduces communication overhead and is more in line with The actual application scenario, and the present invention proposes a new image similarity measurement method at the same time, this measurement method can prevent the similarity information between the images stored in the cloud server from being leaked to the cloud server during the retrieval process, further The privacy information of the image on the cloud server is protected.

Description

technical field [0001] The invention relates to a multi-source encrypted image retrieval method supporting privacy protection, and belongs to the technical field of image encryption and image retrieval. Background technique [0002] In recent years, with the increasing abundance of network media, images, videos, etc. have become an indispensable part of people's lives in addition to text. The information expressed in images is not easy to describe in words, so image retrieval has become a a new requirement. The original image retrieval was based on the idea of ​​text retrieval. Firstly, each image was marked with keywords, and then retrieved based on these keywords, which is also called text-based image retrieval. However, with the rapid development of the network, there will be millions or even hundreds of millions of images generated on the network every second. At this time, labeling each image will consume huge manpower, material resources and financial resources. Late...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/58H04L29/06H04L29/08
CPCG06F16/583H04L63/0428H04L67/10
Inventor 沈蒙程国华祝烈煌
Owner BEIJING INSTITUTE OF TECHNOLOGYGY