Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data

被引:7
|
作者
Yang, Tengfei [1 ,2 ,3 ]
Ma, Jianfeng [1 ,3 ]
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [5 ,6 ]
Wang, Xuan [7 ]
Xiao, Bin [8 ]
Meng, Qian [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[4] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[5] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350116, Fujian, Peoples R China
[6] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[7] Shaanxi Normal Univ, Sch Phys & Informat Technol, Xian 710062, Peoples R China
[8] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Image Cognit, Chongqing 400065, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Privacy preserving; Krawtchouk moment; Paillier cryptosystem; Image reconstruction; Image recognition; RECOGNITION; CLOUD;
D O I
10.1016/j.ins.2020.05.093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resource-constrained users outsource the massive image data to the cloud to reduce storage and computation overhead locally, but security and privacy concerns seriously hinder the applications of outsourced image processing services. Besides, existing image processing solutions in the encrypted domain still bring high computation overhead, and even lead to characteristic loss. To this end, we propose a Privacy-Preserving Krawtchouk Moment (PPKM) feature extraction framework over encrypted image data by utilizing the Paillier cryptosystem. First, a mathematical framework for PPKM implementation and image reconstruction is presented in the encrypted domain. Then, the detailed expanding factor and upper bound analysis shows that plaintext Krawtchouk moment and plaintext image reconstruction can be realized over encrypted image with PPKM. Furthermore, the computation complexity of PPKM can be significantly reduced with the block-based parallel algorithm. Experimental results verify that the PPKM is feasible and acceptable in practice in terms of image reconstruction capability and image recognition accuracy. (C) 2020 Published by Elsevier Inc.
引用
收藏
页码:244 / 262
页数:19
相关论文
共 50 条
  • [41] Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
    Xu, Qunqun
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 239 - 245
  • [42] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [43] Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
    Feng, Jun
    Yang, Laurence T.
    Zhu, Qing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 857 - 868
  • [44] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [45] Towards realistic privacy-preserving deep learning over encrypted medical data
    Cabrero-Holgueras, Jose
    Pastrana, Sergio
    FRONTIERS IN CARDIOVASCULAR MEDICINE, 2023, 10
  • [46] Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud
    Yang, Dan
    Chen, Yu-Chi
    Ye, Shaozhen
    Tso, Raylin
    IEEE ACCESS, 2018, 6 : 63624 - 63634
  • [47] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [48] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [49] Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data
    Li, Xiaoguo
    Xiang, Tao
    Guo, Shangwei
    Li, Hongwei
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2954 - 2968
  • [50] Catch Me in the Dark: Effective Privacy-preserving Outsourcing of Feature Extractions over Image Data
    Wang, Qian
    Hu, Shengshan
    Ren, Kui
    Wang, Jingjun
    Wang, Zhibo
    Du, Minxin
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,