• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Yang, Tengfei (Yang, Tengfei.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Miao, Yinbin (Miao, Yinbin.) [3] | Wang, Yue (Wang, Yue.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [6] | Xiao, Bin (Xiao, Bin.) [7]

Indexed by:

EI

Abstract:

The encrypted image retrieval technique allows users to retrieve images in an encrypted manner without decrypting images. However, most of the existing schemes still are vulnerable to security threats and inefficiency, caused by malicious users and inefficient feature extraction methods, respectively. To this end, we propose a traceable encrypted image retrieval in the multi-user setting in this article, termed as MU-TEIR. First, MU-TEIR employs a convolutional neural network VGG16 to extract image feature vectors and calculate the mean and variance of the feature vectors to construct the index, then encrypts index with the distributed two trapdoors public-key cryptosystem. After that, MU-TEIR protects image content by encrypting each image pixel with a standard stream cipher. Furthermore, MU-TEIR utilizes a watermark-based mechanism to prevent malicious query users from maliciously distributing images. Detailed security analysis shows that MU-TEIR protects the outsourced images and indexes security as well as query privacy, and can track malicious users. Experimental results verify effectiveness of MU-TEIR. © 2008-2012 IEEE.

Keyword:

Cloud computing Extraction Feature extraction Image processing Image retrieval Nearest neighbor search Neural networks Public key cryptography Security systems

Community:

  • [ 1 ] [Yang, Tengfei]Xi'an University of Posts and Telecommunications, School of Cyberspace Security, Xi'an; 710121, China
  • [ 2 ] [Ma, Jianfeng]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 3 ] [Miao, Yinbin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 4 ] [Wang, Yue]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 5 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Key Laboratory of Information Security of Network Systems, Fujian, Fuzhou; 350116, China
  • [ 6 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States
  • [ 7 ] [Xiao, Bin]Chongqing University of Posts and Telecommunications, Chongqing Key Laboratory of Image Cognition, Chongqing; 400065, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Services Computing

Year: 2023

Issue: 2

Volume: 16

Page: 1282-1295

5 . 5

JCR@2023

5 . 5 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 8

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:286/9551268
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1