Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction

被引:4
|
作者
Liu, Xiang [1 ]
Zhao, Xueli [2 ]
Xia, Zhihua [3 ]
Feng, Qian [3 ]
Yu, Peipeng [3 ]
Weng, Jian [3 ]
机构
[1] Dongguan Univ Technol, Inst Sci & Technol Innovat, Dongguan 523808, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Jiangsu Engn Ctr Network Monitoring, Engn Res Ctr Digital Forens,Minist Educ,Sch Comp &, Nanjing 210044, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Natl & Local Joint Engn Res Ctr Network Secur Dete, Guangdong Prov Key Lab Data Secur & Privacy Protec, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Scale-invariant feature transform; privacy preserving; feature extraction; additive secret sharing; cloud computing;
D O I
10.1109/TIP.2023.3295741
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has become an important IT infrastructure in the big data era; more and more users are motivated to outsource the storage and computation tasks to the cloud server for convenient services. However, privacy has become the biggest concern, and tasks are expected to be processed in a privacy-preserving manner. This paper proposes a secure SIFT feature extraction scheme with better integrity, accuracy and efficiency than the existing methods. SIFT includes lots of complex steps, including the construction of DoG scale space, extremum detection, extremum location adjustment, rejecting of extremum point with low contrast, eliminating of the edge response, orientation assignment, and descriptor generation. These complex steps need to be disassembled into elementary operations such as addition, multiplication, comparison for secure implementation. We adopt a serial of secret-sharing protocols for better accuracy and efficiency. In addition, we design a secure absolute value comparison protocol to support absolute value comparison operations in the secure SIFT feature extraction. The SIFT feature extraction steps are completely implemented in the ciphertext domain. And the communications between the clouds are appropriately packed to reduce the communication rounds. We carefully analyzed the accuracy and efficiency of our scheme. The experimental results show that our scheme outperforms the existing state-of-the-art.
引用
下载
收藏
页码:4635 / 4648
页数:14
相关论文
共 50 条
  • [1] Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Luo, Bo
    Wang, Huaqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 179 - 193
  • [2] Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT
    Hsu, Chao-Yung
    Lu, Chun-Shien
    Pei, Soo-Chang
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) : 4593 - 4607
  • [3] Homomorphic Encryption-based Secure SIFT for Privacy-Preserving Feature Extraction
    Hsu, Chao-Yung
    Lu, Chun-Shien
    Soo-Chang, Pei
    MEDIA WATERMARKING, SECURITY, AND FORENSICS III, 2011, 7880
  • [4] Privacy-preserving outsourced image feature extraction
    Li, Dongmei
    Doug, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 59 - 64
  • [5] Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification
    Zhao, Xueli
    Xia, Zhihua
    COMPUTERS & SECURITY, 2023, 124
  • [6] Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
    Hu, Shengshan
    Wang, Qian
    Wang, Jingjun
    Qin, Zhan
    Ren, Kui
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2016, 25 (07) : 3411 - 3425
  • [7] Private Image Computation: the Case of Cloud based Privacy-preserving SIFT
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 179 - 180
  • [8] SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
  • [9] Privacy-preserving inpainting for outsourced image
    Cao, Fang
    Sun, Jiayi
    Luo, Xiangyang
    Qin, Chuan
    Chang, Ching-Chun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (11)
  • [10] Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    PROCEEDINGS OF THE 2014 ACM CONFERENCE ON MULTIMEDIA (MM'14), 2014, : 497 - 506