Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data

被引:7
|
作者
Yang, Tengfei [1 ,2 ,3 ]
Ma, Jianfeng [1 ,3 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [5 ,6 ]
Wang, Xuan [7 ]
Xiao, Bin [8 ]
Meng, Qian [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[5] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[6] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[7] Shaanxi Normal Univ, Sch Phys & Informat Technol, Xian 710062, Peoples R China
[8] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Image Cognit, Chongqing 400065, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Privacy preserving; Krawtchouk moment; Paillier cryptosystem; Image reconstruction; Image recognition; RECOGNITION; CLOUD;
D O I
10.1016/j.ins.2020.05.093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource-constrained users outsource the massive image data to the cloud to reduce storage and computation overhead locally, but security and privacy concerns seriously hinder the applications of outsourced image processing services. Besides, existing image processing solutions in the encrypted domain still bring high computation overhead, and even lead to characteristic loss. To this end, we propose a Privacy-Preserving Krawtchouk Moment (PPKM) feature extraction framework over encrypted image data by utilizing the Paillier cryptosystem. First, a mathematical framework for PPKM implementation and image reconstruction is presented in the encrypted domain. Then, the detailed expanding factor and upper bound analysis shows that plaintext Krawtchouk moment and plaintext image reconstruction can be realized over encrypted image with PPKM. Furthermore, the computation complexity of PPKM can be significantly reduced with the block-based parallel algorithm. Experimental results verify that the PPKM is feasible and acceptable in practice in terms of image reconstruction capability and image recognition accuracy. (C) 2020 Published by Elsevier Inc.
引用
收藏
页码:244 / 262
页数:19
相关论文
共 50 条
  • [1] Encrypted Image Feature Extraction By Privacy-Preserving MFS
    Chen, Guoming
    Chen, Qiang
    Zhu, Xiongyong
    Chen, Yiqun
    2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME (ICDH 2018), 2018, : 42 - 45
  • [2] Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT
    Hsu, Chao-Yung
    Lu, Chun-Shien
    Pei, Soo-Chang
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) : 4593 - 4607
  • [3] Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments
    Yang, Tengfei
    Ma, Jianfeng
    Wang, Qian
    Miao, Yinbin
    Wang, Xuan
    Meng, Qian
    IEEE ACCESS, 2018, 6 : 47521 - 47534
  • [4] Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
    Hu, Shengshan
    Wang, Qian
    Wang, Jingjun
    Qin, Zhan
    Ren, Kui
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2016, 25 (07) : 3411 - 3425
  • [5] PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data
    Yang, Tengfei
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Wang, Xuan
    Meng, Qian
    INFORMATION SCIENCES, 2019, 505 : 198 - 214
  • [6] Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Luo, Bo
    Wang, Huaqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 179 - 193
  • [7] Privacy-preserving outsourced image feature extraction
    Li, Dongmei
    Doug, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 59 - 64
  • [8] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [9] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [10] Outsourced privacy-preserving classification service over encrypted data
    Li, Tong
    Huang, Zhengan
    Li, Ping
    Liu, Zheli
    Jia, Chunfu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 : 100 - 110