An encrypted image retrieval method supporting multiple keys

An encrypted image, multi-key technology, applied in still image data retrieval, metadata still image retrieval, key distribution, and can solve problems such as increased computing overhead on the user side

Active Publication Date: 2019-03-29
XIDIAN UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although encrypted image retrieval can be realized based on homomorphic encryption and searchable encryption technology, most of the current schemes only support single-key scenarios. If...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encrypted image retrieval method supporting multiple keys
  • An encrypted image retrieval method supporting multiple keys
  • An encrypted image retrieval method supporting multiple keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below in conjunction with the accompanying drawings.

[0048] see figure 1 , in the present invention, the user only needs to generate a trapdoor to query the image sets encrypted by different keys, which solves the problem that the query user needs to generate a trapdoor corresponding to each encryption key in the traditional method.

[0049] see figure 2 , the present invention includes 4 entities, namely key generation center, image owner, image query user and cloud server. The fully trusted key generation center is responsible for system initialization and key distribution; the image owner is responsible for index establishment; the query user is responsible for trapdoor generation; the honest and curious cloud server is responsible for retrieving the encrypted image set and re-encrypting the key ciphertext. In order to realize the encrypted image retrieval method supporting multiple keys, the specific implementatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted image retrieval method supporting multiple keys. The invention utilizes proxy re-encryption technology to convert different image encryption keys into the form that the inquiry user can decrypt with his private key, applies local sensitive hash algorithm to pre-classify the image set, improves the retrieval speed, and then encrypts the image feature vector withthe safe nearest neighbor algorithm to improve the retrieval precision. The invention supports a query user to query image sets from different encryption keys by using a query trap under a multi-keyscenario, and the user can only decrypt the query result by using a legal private key. The invention can protect data privacy and safety, and the cloud server cannot obtain any plaintext information from the ciphertext set, the index set and the ciphertext key set, nor can it obtain any plaintext information from the query trap. The invention is efficient and feasible in practical application.

Description

technical field [0001] The invention belongs to the field of multimedia information security, in particular to an encrypted image retrieval method supporting multiple keys. Background technique [0002] With the continuous upgrading of image devices such as digital cameras and smart phones, and the emergence of various image applications, image data has increased dramatically, greatly increasing the burden of local image data calculation and storage for users. Although the cloud outsourcing service can reduce the user's local image data calculation and storage burden, it will cause the user to be unable to actually control the data, resulting in security risks. Therefore, the user encrypts the image data and then stores it on the cloud server. Although encrypting images can guarantee the security of image data to a certain extent, it will lead to the fact that the traditional plaintext image retrieval technology cannot be directly implemented on ciphertext. [0003] Tradit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/58H04L9/08
CPCH04L9/0861
Inventor 马建峰苗银宾李颖莹卢笛王祥宇杨腾飞马鑫迪习宁
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products