Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data

被引:7
|
作者
Yang, Tengfei [1 ,2 ,3 ]
Ma, Jianfeng [1 ,3 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [5 ,6 ]
Wang, Xuan [7 ]
Xiao, Bin [8 ]
Meng, Qian [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[5] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[6] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[7] Shaanxi Normal Univ, Sch Phys & Informat Technol, Xian 710062, Peoples R China
[8] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Image Cognit, Chongqing 400065, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Privacy preserving; Krawtchouk moment; Paillier cryptosystem; Image reconstruction; Image recognition; RECOGNITION; CLOUD;
D O I
10.1016/j.ins.2020.05.093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource-constrained users outsource the massive image data to the cloud to reduce storage and computation overhead locally, but security and privacy concerns seriously hinder the applications of outsourced image processing services. Besides, existing image processing solutions in the encrypted domain still bring high computation overhead, and even lead to characteristic loss. To this end, we propose a Privacy-Preserving Krawtchouk Moment (PPKM) feature extraction framework over encrypted image data by utilizing the Paillier cryptosystem. First, a mathematical framework for PPKM implementation and image reconstruction is presented in the encrypted domain. Then, the detailed expanding factor and upper bound analysis shows that plaintext Krawtchouk moment and plaintext image reconstruction can be realized over encrypted image with PPKM. Furthermore, the computation complexity of PPKM can be significantly reduced with the block-based parallel algorithm. Experimental results verify that the PPKM is feasible and acceptable in practice in terms of image reconstruction capability and image recognition accuracy. (C) 2020 Published by Elsevier Inc.
引用
收藏
页码:244 / 262
页数:19
相关论文
共 50 条
  • [21] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5479 - 5492
  • [22] Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
    Liang, Kaitai
    Huang, Xinyi
    Guo, Fuchun
    Liu, Joseph K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2365 - 2376
  • [23] Improvement on a privacy-preserving outsourced classification protocol over encrypted data
    Yanting Chai
    Yu Zhan
    Baocang Wang
    Yuan Ping
    Zhili Zhang
    Wireless Networks, 2020, 26 : 4363 - 4374
  • [24] Resolving privacy-preserving relationships over outsourced encrypted data storages
    Huertas Celdran, Alberto
    Dolera Tormo, Gines
    Marmol, Felix Gomez
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (02) : 195 - 209
  • [25] Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data
    Abduljabbar, Zaid Ameen
    Ibrahim, Ayad
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Umran, Samir M.
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1397 - 1398
  • [26] Resolving privacy-preserving relationships over outsourced encrypted data storages
    Alberto Huertas Celdrán
    Ginés Dólera Tormo
    Félix Gómez Mármol
    Manuel Gil Pérez
    Gregorio Martínez Pérez
    International Journal of Information Security, 2016, 15 : 195 - 209
  • [27] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [28] Selective Feature Anonymization for Privacy-Preserving Image Data Publishing
    Kim, Taehoon
    Yang, Jihoon
    ELECTRONICS, 2020, 9 (05)
  • [29] Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    PROCEEDINGS OF THE 2014 ACM CONFERENCE ON MULTIMEDIA (MM'14), 2014, : 497 - 506
  • [30] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177