Privacy-preserving transfer learning-based secure quantum image retrieval in encrypted domain for cloud environment

被引:0
|
作者
Janani, Thiyagarajan [1 ]
Brindha, Murugan [2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Dept Software Syst, Vellore, Tamil Nadu, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
关键词
quantum image encryption; feature encryption; transfer learning; similarity matching; cloud storage; CHAOS; EFFICIENT; SEARCH;
D O I
10.1117/1.JEI.32.2.023003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, the rapid growth of personal handheld electronic devices encourages the individual and organizations to upload their information to cloud for storage and processing purposes. To ensure privacy, the images are encrypted using cryptographic schemes that are outsourced to the cloud. Though images are encrypted, searching for similar images leads the cloud server to access the image data as it performs computation over plaintext. Thus, to ensure the privacy of the images during image retrieval, the proposed framework presents a transfer learning-based secure quantum image retrieval scheme over encrypted cloud. The confidentiality of the images is guaranteed by introducing quantum-based image encryption. Meanwhile, clustered image feature vectors are extracted through the transfer learning model and protected using secure multiparty computation. During retrieval, the proposed system introduces a similarity comparison model for performing computation on encrypted data. The experiments and performance analysis show the effectiveness and security of the proposed scheme.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [2] Privacy-preserving image retrieval based on additive secret sharing in cloud environment
    Zhang, Bo
    Xu, Yanyan
    Yan, Yuejing
    Wang, Zhiheng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 5021 - 5045
  • [3] A privacy-preserving content-based image retrieval method in cloud environment
    Xu, Yanyan
    Gong, Jiaying
    Xiong, Lizhi
    Xu, Zhengquan
    Wang, Jinwei
    Shi, Yun-qing
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 43 : 164 - 172
  • [4] EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing
    Feng Q.
    Li P.
    Lu Z.
    Li C.
    Wang Z.
    Liu Z.
    Duan C.
    Huang F.
    Weng J.
    Y P.S.
    IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34 (08) : 1 - 1
  • [5] Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Luo, Bo
    Wang, Huaqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 179 - 193
  • [6] A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment
    Gong, Jiaying
    Xu, Yanyan
    Zhao, Xiao
    IETE TECHNICAL REVIEW, 2018, 35 : 76 - 84
  • [7] Privacy-Preserving Content-Based Image Retrieval in the Cloud
    Ferreira, Bernardo
    Rodrigues, Joao
    Leitao, Joao
    Domingos, Henrique
    2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, : 11 - 20
  • [8] Privacy-preserving image retrieval in a distributed environment
    Zhou, Fucai
    Qin, Shiyue
    Hou, Ruitao
    Zhang, Zongye
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 7478 - 7501
  • [9] A Privacy-Preserving and End-to-End-Based Encrypted Image Retrieval Scheme
    Lu, Zhixun
    Feng, Qihua
    Li, Peiya
    2022 IEEE INTERNATIONAL CONFERENCE ON VISUAL COMMUNICATIONS AND IMAGE PROCESSING (VCIP), 2022,
  • [10] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158