AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval

被引:0
|
作者
Li, Dong [1 ]
Lu, Qingguo [1 ]
Liao, Xiaofeng [1 ]
Xiang, Tao [1 ]
Wu, Jiahui [2 ]
Le, Junqing [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Key Lab Dependable Serv Comp Cyber Phys & Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Biomedical imaging; Indexes; Image retrieval; Servers; Feature extraction; Encryption; Cloud computing; Adaptive verifiable result; chameleon hash; encryption searchable index tree; index merge; privacy-preserving; CLOUD; SCHEME; SECURE;
D O I
10.1109/TDSC.2024.3355223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing privacy concerns associated with cloud-assisted image retrieval have captured the attention of researchers. However, a significant number of current research endeavors encounter limitations, including suboptimal accuracy, inefficient retrieval, and a lack of effective result verification mechanisms. To address these limitations, we propose an adaptive verifiable privacy-preserving medical image retrieval (AVPMIR) scheme in the outsourced cloud. Specifically, we utilize the convolutional neural network (CNN) ResNet50 model to extract the feature of each medical image within the dataset of the medical institution, aiming to enhance retrieval accuracy. To enhance retrieval efficiency, we build an encryption searchable index based on a mini-batch k-means clustering algorithm. Furthermore, we present an index merging method in which multi-data owners build a different index tree according to different standards. To check the correctness of the returned results from the cloud server, we construct an adaptive verification framework for the obtained results based on chameleon hash and BLS signature. To provide strong security for the medical image datasets, we design an improved logistic chaotic mapping algorithm. The security analysis demonstrates that AVPMIR can defend various threat models. The experiment analysis further indicates that the AVPMIR can improve retrieval efficiency and demonstrate its practicability.
引用
收藏
页码:4637 / 4651
页数:15
相关论文
共 50 条
  • [1] Verifiable privacy-preserving semantic retrieval scheme in the edge computing
    Guo, Jiaqi
    Tian, Cong
    He, Qiang
    Zhao, Liang
    Duan, Zhenhua
    [J]. Journal of Systems Architecture, 2024, 156
  • [2] Privacy-Preserving Verifiable CNNs
    Attrapadung, Nuttapong
    Hanaoaka, Goichiro
    Hiromasa, Ryo
    Koseki, Yoshihiro
    Matsuda, Takahiro
    Nishida, Yutaro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    Yasuda, Satoshi
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 373 - 402
  • [3] Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings
    Khan, Shahzad
    Abbas, Haider
    Iqbal, Waseem
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (02): : 1640 - 1655
  • [4] Privacy-preserving image retrieval in a distributed environment
    Zhou, Fucai
    Qin, Shiyue
    Hou, Ruitao
    Zhang, Zongye
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 7478 - 7501
  • [5] Toward privacy-preserving JPEG image retrieval
    Cheng, Hang
    Wang, Jingyue
    Wang, Meiqing
    Zhong, Shangping
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2017, 26 (04)
  • [6] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [7] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    [J]. PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [8] A Note on Verifiable Privacy-Preserving Tries
    Kissel, Zachary A.
    Wang, Jie
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 942 - 943
  • [9] Privacy-preserving Image Retrieval in IoT-Cloud
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Ibrahim, Ayad
    Hussien, Zaid Alaa
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 799 - 806
  • [10] A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion
    Qin, Jiaohua
    Chen, Jianhua
    Xiang, Xuyu
    Tan, Yun
    Ma, Wentao
    Wang, Jing
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) : 161 - 173