A secure image retrieval method based on secret sharing in cloud environment

A technology of secret sharing and cloud environment, applied in the field of multimedia information security protection, to achieve the effect of protecting index security, overcoming precision loss, and increasing difficulty

Active Publication Date: 2021-04-16
WUHAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data owner generates a ciphertext image and an index share and uploads them to the cloud. When querying, the user generates a trapdoor share and sends it to the cloud. The cloud can calculate the distance share and return the ciphertext image closest to the query image, which can solve the existing The security problem of scheme encryption using unified key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure image retrieval method based on secret sharing in cloud environment
  • A secure image retrieval method based on secret sharing in cloud environment
  • A secure image retrieval method based on secret sharing in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Such as figure 1 As shown, an image security retrieval method based on secret sharing in a cloud environment provided by the embodiment of the present invention, the specific implementation steps are:

[0061] Step 1, the image owner extracts image features, generates index shares, and uploads the index shares and encrypted images to the cloud:

[0062] Step 1.1, index construction: for all images of the image owner, extract color features to generate an index, where the yth image feature is expressed as n represents the dimension of the feature point descriptor;

[0063] Step 1.2, build index share: generate a string of random numbers a=(a 1 ,...,a n ), for image h y Generate index shares. For m=1,2,..,n:

[0064]

[0065]

[0066]

[0067] index share h y (1) Send to server 1, index share h y (2) Send to server 2, index share h y (3) send to server 3;

[0068] Step 1.3, use the AES encryption algorithm and key K to encrypt the yth original image I ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention aims to propose an image security retrieval scheme based on secret sharing in a cloud environment, and realize secure retrieval of cloud images by constructing index shares and trapdoor shares. The data owner generates a ciphertext image and an index share and uploads them to the cloud. When querying, the user generates a trapdoor share and sends it to the cloud. The cloud can calculate the distance share and return the ciphertext image closest to the query image, which can solve the existing The scheme encryption uses the security problem of the unified key; in order to prevent the attacker from inferring the image based on the original Euclidean distance analysis image similarity information, the distance share is encrypted using random numbers and secure multi-party computing methods. The security of this scheme relies on the secret sharing technology, which overcomes the common precision loss problem in image security retrieval, and the retrieval precision is almost the same as that of plaintext domain image retrieval.

Description

technical field [0001] The invention belongs to the field of multimedia information security protection, and in particular relates to an image security retrieval method of secret sharing technology and secure multi-party computing technology. Background technique [0002] With the popularization of digital cameras and smart phones, the number of images, graphics and photos is increasing at an increasing rate. Since the cloud computing platform has the advantages of large scale, high reliability, strong versatility, strong scalability, and low cost, more and more image owners choose to outsource images to cloud servers. However, data outsourced to the cloud is completely out of the direct physical control of its owner, and will face double threats from external network attackers and untrusted cloud service providers (CSPs). Data stored in the cloud may be exposed to leaks or risk of misuse. [0003] To prevent privacy leaks, sensitive images need to be encrypted locally and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L29/08G06F16/51G06F16/583G06F21/60
CPCG06F21/602G06F16/51G06F16/5838H04L9/0631H04L9/0822H04L9/085H04L9/0869H04L63/0428H04L67/10
Inventor 徐彦彦张逸然闫悦菁
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products