Cloud computing offers flexible and on-demand storages of documents, images, audio and video. Popularity of imaging devices increased the importance of images in people’s life. Huge number of images, their storage and maintenance are the main issues in the cloud computing; the reason is images take more space for storage than text. To keep the privacy of the sensitive images like personal or medical images, it should be encrypted before uploading to cloud. This scheme is based on the content-based image retrieval without spreading the sensitivity of the images that are encrypted and outsourced to cloud. Feature vectors are extracted from the image and pre-filter tables are generated for improving the search efficiency. Here image pixels are encrypted using AES algorithm. The main concern is that authorized users will try to illegally distribute the images over the unauthorized world. To prevent this distribution, a watermark-based protocol is used to prove the ownership of the images. Additionally, user complaints about the ownerships are also processed by extracting the watermark. Hence this scheme can reduce the copy deterrence of images by encryption and watermarking.
Copy deterrence; Content based retrieval; AES algorithm
Xia Z, Wang X, Zhang L, Qin Z, Sun X. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. Proc IEEE Infor Forens Secur. 2016; 11(11).
Shashank J, Kowshik P, Srinathan K, Jawahar CV. Private content based image retrieval. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition. 2008, June 23–28, pp. 1–8.
Lu W, Swaminathan A, Varna AL, Wu M. Enabling search over encrypted multimedia databases. Proc SPIE. 2009; 7254: 725418.
Lu W, Varna AL, Swaminathan A, Wu M. Secure image retrieval through feature protection. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. 2009, April 19–24, pp. 1533–1536.
Cheng H, Zhang X, Yu J, Li F. Markov process-based retrieval for encrypted JPEG images. In: 2015 10th International Conference on Availability, Reliability and Security. 2015, August 24–27, pp. 417–421.