Image security retrieval method based on secret sharing in cloud environment

A technology of secret sharing and cloud environment, applied in the field of multimedia information security protection, to overcome the loss of precision, protect index security, and increase difficulty

Active Publication Date: 2020-08-14
WUHAN UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data owner generates a ciphertext image and an index share and uploads them to the cloud. When querying, the user generates a trapdoor share and sends it to the cloud. The cloud can calculate the distance share and return the ciphertext image closest to the query image, which can solve the existing The security problem of scheme encryption using unified key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image security retrieval method based on secret sharing in cloud environment
  • Image security retrieval method based on secret sharing in cloud environment
  • Image security retrieval method based on secret sharing in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Such as figure 1 As shown, an image security retrieval method based on secret sharing in a cloud environment provided by the embodiment of the present invention, the specific implementation steps are:

[0061] Step 1, the image owner extracts image features, generates index shares, and uploads the index shares and encrypted images to the cloud:

[0062] Step 1.1, index construction: for all images of the image owner, extract color features to generate an index, where the yth image feature is expressed as n represents the dimension of the feature point descriptor;

[0063] Step 1.2, build index share: generate a string of random numbers a=(a 1 ,...,a n ), for image h y Generate index shares. For m=1,2,..,n:

[0064]

[0065]

[0066]

[0067] index share h y (1) Send to server 1, index share h y (2) Send to server 2, index share h y (3) send to server 3;

[0068] Step 1.3, use the AES encryption algorithm and key K to encrypt the yth original image I ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide an image security retrieval scheme based on secret sharing in a cloud environment, which realizes security retrieval of a cloud image by constructing an index share and atrap door share. A data owner generates a ciphertext image and an index share and uploads the ciphertext image and the index share to a cloud, during query, a user generates a trap door share and sends the trap door share to the cloud, and the cloud can calculate a distance share and return the ciphertext image closest to the query image, so that the security problem caused by using a unified keyfor encryption in an existing scheme can be solved. In order to prevent an attacker from analyzing image similarity information according to an original Euclidean distance to speculate an image, a random number and a secure multi-party calculation method are used to encrypt a distance share. The security of the scheme depends on a secret sharing technology, the common precision loss problem in image security retrieval is solved, and the retrieval precision is almost consistent with that of plaintext domain image retrieval.

Description

technical field [0001] The invention belongs to the field of multimedia information security protection, and in particular relates to an image security retrieval method of secret sharing technology and secure multi-party computing technology. Background technique [0002] With the popularization of digital cameras and smart phones, the number of images, graphics and photos is increasing at an increasing rate. Since the cloud computing platform has the advantages of large scale, high reliability, strong versatility, strong scalability, and low cost, more and more image owners choose to outsource images to cloud servers. However, data outsourced to the cloud is completely out of the direct physical control of its owner, and will face double threats from external network attackers and untrusted cloud service providers (CSPs). Data stored in the cloud may be exposed to leaks or risk of misuse. [0003] To prevent privacy leaks, sensitive images need to be encrypted locally and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L29/08G06F16/51G06F16/583G06F21/60
CPCG06F21/602G06F16/51G06F16/5838H04L9/0631H04L9/0822H04L9/085H04L9/0869H04L63/0428H04L67/10
Inventor 徐彦彦张逸然闫悦菁
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products