A Verifiable Privacy Preserving Method for Encrypted Image Retrieval

A privacy protection and image encryption technology, which is applied in still image data retrieval, still image data indexing, digital data protection, etc., to achieve the effect of feasibility and privacy protection

Active Publication Date: 2022-04-08
GUANGXI NORMAL UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims to solve the problems of privacy protection and query verification of encrypted image retrieval in a cloud computing environment, and provides a verifiable privacy protection method for encrypted image retrieval

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Verifiable Privacy Preserving Method for Encrypted Image Retrieval
  • A Verifiable Privacy Preserving Method for Encrypted Image Retrieval
  • A Verifiable Privacy Preserving Method for Encrypted Image Retrieval

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific examples.

[0049] In order to ensure verifiable query of encrypted pictures in cloud scenarios, the present invention proposes a new query authentication scheme to defend against untrustworthy cloud service providers. The key to realize query verification is to design query verification index structure by integrating existing indexes and cryptographic tools. The image retrieval verification index structure consists of two parts: Merkel hierarchical clustering index tree and MRKD tree construction. The present invention allows image owners to outsource their image databases to cloud-based service providers and ensure the integrity and correctness of query processing. Like other common data-as-a-service (DaaS) systems, it consists of three parties: (i) the image owner who outsources ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable encryption image retrieval privacy protection method, which utilizes Merkle hash tree technique to link Merkle hierarchical clustering index tree and Merkle KD tree together, and Merkle hierarchical clustering The index tree can speed up the search process, find clusters with high similarity to the query image, and use the Merkle KD tree to construct the spatial index of the clustered encrypted feature vector, which can improve the speed of finding similar feature vectors in the cluster , and can reverse-verify the lookup process. The Merkle KD tree is built on the image feature vector encrypted by ASPE, and the representation vectors of the hierarchical clustering index tree nodes are all encrypted by the ASPE method, which not only protects the privacy of the image feature vector, but also realizes the Feasibility of image retrieval under encryption.

Description

technical field [0001] The invention relates to the technical field of image retrieval, in particular to a verifiable privacy protection method for encrypted image retrieval. Background technique [0002] With the rapid development and popularization of cloud computing, people enjoy various conveniences brought by cloud services, such as storing pictures on the cloud. However, outsourcing images directly to the public cloud inevitably raises privacy concerns. Massive images containing highly sensitive information, such as medical images of patients, could cause serious consequences or unnecessary trouble if leaked to unauthorized entities. The encryption mechanism can alleviate the security and privacy problems of image data to a certain extent, but it will make the content-based image retrieval (CBIR) technology invalid on the ciphertext. And although this outsourcing model reduces the burden on users, users may lose control over data and cannot guarantee the integrity of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/51G06F16/55G06V10/74G06V10/762G06V10/82G06K9/62G06N3/04G06N3/08
CPCG06F21/602G06F21/6245G06F16/51G06F16/55G06N3/08G06N3/045G06F18/22G06F18/23213
Inventor 李先贤雷杰石贞奎
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products