Volume 37, Issue 10 pp. 7478-7501
RESEARCH ARTICLE

Privacy-preserving image retrieval in a distributed environment

Fucai Zhou

Fucai Zhou

Software College, Northeastern University, Shenyang, China

Search for more papers by this author
Shiyue Qin

Corresponding Author

Shiyue Qin

Key Laboratory of Data Analytics and Optimization for Smart Industry (Northeastern University), Ministry of Education, Shenyang, China

Correspondence Shiyue Qin, Key Laboratory of Data Analytics and Optimization for Smart Industry (Northeastern University), Ministry of Education, Shenyang, China.

Email: [email protected]

Search for more papers by this author
Ruitao Hou

Ruitao Hou

Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China

Search for more papers by this author
Zongye Zhang

Zongye Zhang

Software College, Northeastern University, Shenyang, China

Search for more papers by this author
First published: 25 April 2022
Citations: 8

Abstract

Nowadays, several image-based smart services have been widely used in our daily lives, generating many digital images. Since smart devices outsource digital images to the cloud, researchers prefer to select some desired targets from the massive images within the cloud for analysis and improve smart services. Therefore, protective image retrieval on the cloud has attained maximum concentration for privacy-preserving purposes, and the availability assurance of images on the cloud is also a crucial link. Ensuring image security and availability in the cloud environment and precisely preserving retrieval accuracy is comes as a utility-security dilemma while few existing works have explicitly addressed it. Therefore, this paper proposes privacy-preserving image retrieval in the distributed environment based on the combination of image encryption for similarity search and secret image sharing. On the basis of them, we define two-stage encryption. The first-stage encryption algorithm is introduced by modifying Wolfram's reversible cellular automata-based image encryption, which can create a set of processing images to ensure image security and retrieval accuracy. Then, the second-stage encryption algorithm is put forward based on secret image sharing to improve image security and availability. The color histogram could be extracted from the encrypted images for similarity retrieval, and the shadows could be extracted for similar image recovery. Security analysis demonstrates that image privacy and query privacy could be well protected. Moreover, the proposed work achieves more efficient performance for similarity search and similar image recovery compared with some recent works and realizes a reasonable retrieval accuracy on encrypted images for similarity search.

DATA AVAILABILITY STATEMENT

The data that support the findings of this study are openly available in [Corel-1000] at http://wang.ist.psu.edu/%7Ejwang/test1.tar, reference number.19

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.