A fuzzy searching method for encrypted images

A technology of encrypting images and fuzzy search, applied in the Internet field, can solve problems such as key management difficulties, deviations between input and target information, and unclear data owners

Active Publication Date: 2019-03-01
NORTHEASTERN UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In a fully distributed working environment, key management is very difficult. For example, in an IoT environment, cameras and sensors collect a large amount of data from different sources, and these data need to be stored and can be accessed by multiple parties. Then how to manage keys is an important issue. The core problem is not to generate and save these keys, but to determine...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fuzzy searching method for encrypted images
  • A fuzzy searching method for encrypted images
  • A fuzzy searching method for encrypted images

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below with reference to the accompanying drawings and through specific embodiments.

[0068] The architecture of the fuzzy search method for encrypted images of this embodiment is as follows: figure 1 As shown, the method contains three types of entities. One is the data owner (the owner of the image data), the second is the cloud server (responsible for storing encrypted data and building a secure index), and the third is the data visitor (the data owner can also be the data visitor). From figure 1 It can be seen that the data visitor first processes the original image, obtains the encrypted image, the label set and the encrypted symmetric key secret share set and uploads it to the cloud server, and then the cloud server stores it and builds a secure index. When a visitor makes a query, a search token must be constructed using the search image...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fuzzy searching method for encrypted images. The communication between entities in the method is mainly divided into two parts: encrypted upload and fuzzy search. The participants of the encrypted upload part include the data owner and the cloud server; the participants of the fuzzy search part include the data visitor and the cloud server. The fuzzy search process does not involve the data owner. It can solve the problem that the existing searchable encryption scheme heavily relies on the key, and solve the problem that the key management is difficult in the distributed environment. The method does not need to carry out key management operations such as key safe storage and key safe transmission, thus saving key management overhead. The method can perform image blurring search operation without access authorization, thus saving the overhead of access authorization operation; the method can perform image decryption without decryption authorization, simplifiesthe decryption process, and ensures the correctness and security of the method.

Description

Technical field [0001] The invention belongs to the field of Internet technology, and specifically relates to a fuzzy search method for encrypted images. Background technique [0002] The proliferation of digital activities such as mobile browsing, web search, and social media applications has led to a surge in data volume. The emerging deployment of information sensors in scenarios such as the Internet of Things (IoT), self-driving cars, and video surveillance will inevitably lead to the need to collect, store, access and use huge amounts of additional data. It is estimated that until 2020, the total global data The amount will reach 40ZB. Obviously, mining these data has great prospects, but unrestricted access can pose a major threat to users and data privacy. Due to data storage costs, data management costs, data storage efficiency, and other considerations, big data can no longer use centralized storage like traditional information systems. With the rapid rise of new model...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F16/2458
CPCG06F21/602G06F21/6227
Inventor 周福才张宗烨秦诗悦贾强徐紫枫
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products