Privacy-protected encrypted image retrieval method and system

A technology for encrypting images and protecting privacy, applied in the field of image processing, can solve the problem of privacy leakage of retrieval results and retrieval efficiency, and achieve the effect of simplifying the image feature calculation process, ensuring privacy security, and realizing secure retrieval.

Active Publication Date: 2021-03-19
XIDIAN UNIV
View PDF14 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005]Aiming at the problems of privacy leakage and retrieval efficiency of retrieval results in the existing security retrieval technology, a privacy-protected encrypted image retrieval method and system are proposed. Retrieve similar images in the library. The image owner encrypts the image and uploads it to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-protected encrypted image retrieval method and system
  • Privacy-protected encrypted image retrieval method and system
  • Privacy-protected encrypted image retrieval method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below in conjunction with the accompanying drawings, which are explanations rather than limitations of the present invention.

[0044] refer to figure 1 , a privacy-preserving encrypted image retrieval method, comprising the following steps:

[0045] Step 1, build an image encryption system and generate the key required for the encryption algorithm.

[0046] The key is generated using the key generation algorithm as follows:

[0047] Among them, M 1 ,M 2 Represents two invertible matrices randomly generated by the image owner, Respectively represent M 1 ,M 2 The inverse matrix of , π represents a random permutation function, which can randomly disrupt the order of elements in the vector, kmg represents the key required for image encryption using the chaotic mapping algorithm;

[0048] Step 2, extract the feature vector of the image and build the index table.

[0049] Step 1: The image owner extracts the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy-protected encrypted image retrieval method and system, and the method comprises the specific implementation steps that an image owner extracts the feature vector of an image, encrypts the image and the feature vector, and uploads the encrypted image and the encrypted feature vector to a cloud server; when a query user searches, a query vector of a query image is extracted and encrypted, and a trap door is generated from the encrypted query vector and a set similarity query threshold and sent to the cloud server; and the cloud server retrieves the encrypted image set according to the query trap door and the index table and returns a retrieval result to the query user, and the query user decrypts the retrieval result to obtain a retrieval result. According to the method and system, based on the chaotic mapping image encryption algorithm, the convolutional neural network model is adopted to extract the image features, the image retrieval efficiency is improved, and finally, the cloud server only returns similar results within the threshold range and does not perform similar sorting, so that the security is further improved. The whole retrieval processis achieved in a ciphertext domain, and safe retrieval of the image is effectively achieved on the premise that stored data information and retrieval result related information are not leaked.

Description

technical field [0001] The invention belongs to the field of image processing, in particular to a privacy-protected encrypted image retrieval method and system. Background technique [0002] With the development of Internet technology, the application of social network platforms is also booming, and network users generate a large number of images every day, resulting in an increasing demand for image retrieval. In the process of image retrieval, sufficient storage space and computing resources are often required, and it is often difficult for image owners to meet these requirements. With the increasing popularity of cloud computing and storage, migrating services to cloud servers has quickly become a trend for massive data storage and management. Although this reduces the burden on image owners, it also leads to new privacy leaks. In order to protect the information in the image database from being leaked during the storage and retrieval process, generally, the image owner ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/583G06F16/538G06F16/51G06F21/60G06N3/04G06N3/08
CPCG06F16/583G06F16/538G06F16/51G06F21/602G06N3/08G06N3/045
Inventor 苗银宾宋琳李颖莹童秋云刘彤郑玮
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products