An image compression and encryption scheme for similarity retrieval

被引:0
|
作者
Meng, Ke [1 ]
Wo, Yan [1 ]
机构
[1] South China Univ Technol, Coll Comp Sci & Engn, Guangzhou 510641, Peoples R China
关键词
Information bottleneck; Compressed domain retrieval; Retrieval encryption; Cascade compression encryption; Image similarity retrieval;
D O I
10.1016/j.image.2023.117044
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of cloud computing, people usually outsource encrypted images for saving storage and protecting privacy. However, traditional image encryption methods not only hinder the availability of images such as similarity retrieval, but also degrade the compression performance. To address this issue, we propose a retrievable image compression and encryption method(RICE). RICE takes into account the contradiction of image compression, availability and security, then propose a cascaded information bottleneck model, which includes the compression information bottleneck and the security and availability information bottleneck. The former is converted into a rate distortion problem and its optimal solution is sought by a convolutional neural network(CNN)-based compression network which includes channel space attention module and discrete wavelet transform(DWT) module. To solve the later, we propose a feature partition method to find a retrieval subset that balances the contradiction between security and availability, and design a DNA-based deterministic encryption method for this subset to support ciphertext retrieval. The ciphertext of the retrieved subset is sent to the proposed similarity search fully connected network(SimFcNet) to improve the retrieval accuracy. The remaining subset is encrypted by Non-deterministic encryption to further improve security. In general, the method RICE we proposed supports similarity retrievable in compressed domain ciphertext, and can achieve excellent performance. Experimental results show that our method is 36.56% higher than JPEG2000 at compression ratio of 60:1 in MS-SSIM, the accuracy of ciphertext retrieval can reach 0.828, and the security of ciphertext is close to that of traditional encryption methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] An image compression-encryption scheme based on compressive sensing and hyperchaotic system
    Brahim, A. Hadj
    Pacha, A. Ali
    Said, N. Hadj
    JOURNAL OF OPTICS-INDIA, 2024,
  • [32] A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding
    Yang, Yang
    Cheng, Ming
    Ding, Yingqiu
    Zhang, Weiming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2387 - 2401
  • [33] Joint image compression–encryption scheme using entropy coding and compressive sensing
    Yanjie Song
    Zhiliang Zhu
    Wei Zhang
    Li Guo
    Xue Yang
    Hai Yu
    Nonlinear Dynamics, 2019, 95 : 2235 - 2261
  • [34] Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System
    Zhang, Miao
    Tong, Xiaojun
    Wang, Zhu
    Chen, Penghui
    ENTROPY, 2021, 23 (08)
  • [35] Concatenated Image Compression and Encryption
    Alshaya, Abdulaziz
    Komies, Saleh
    2021 4TH INTERNATIONAL SYMPOSIUM ON ADVANCED ELECTRICAL AND COMMUNICATION TECHNOLOGIES (ISAECT), 2021,
  • [36] Image retrieval by texture similarity
    Huang, PW
    Dai, SK
    PATTERN RECOGNITION, 2003, 36 (03) : 665 - 679
  • [37] An Efficient Scheme for Joint Compression and Encryption
    Qiu, Lirong
    Yu, Yang
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (5-6): : 539 - 548
  • [38] Compression performance of JPEG encryption scheme
    Kailasanathan, C
    Naini, RS
    Ogunbona, P
    DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, 2002, : 1329 - 1332
  • [39] Multi-key spatio-temporal chaotic image encryption and retrieval scheme
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Fang, Huiyu
    NONLINEAR DYNAMICS, 2024, 112 (04) : 3003 - 3025
  • [40] Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
    Wang, Zhen
    Zhang, Qiu-yu
    Meng, Ling-tao
    Liu, Yi-lin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 6161 - 6184