Loading…

A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing

To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For t...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia systems 2021-06, Vol.27 (3), p.403-415
Main Authors: Wang, Zhangdong, Qin, Jiaohua, Xiang, Xuyu, Tan, Yun
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3
cites cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3
container_end_page 415
container_issue 3
container_start_page 403
container_title Multimedia systems
container_volume 27
creator Wang, Zhangdong
Qin, Jiaohua
Xiang, Xuyu
Tan, Yun
description To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.
doi_str_mv 10.1007/s00530-020-00734-w
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2541857188</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2541857188</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKt_wFXAdfTmMTOZZSlqhYIbXYdMJqlTOw-TTEv_vakjuHNxOXA551zuh9AthXsKUDwEgIwDAZYGCi7I4QzNqOCMUCnZOZpBKRgRZc4u0VUIWwBa5BxmSC_w4Ju9NkcyeBus3zfdBuuuxtHrJvb-pObztDR9F20XSaWDrXHT6o3F3kbf2L3e4WA-bGtx02Gz68c6udthjCl3jS6c3gV786tz9P70-LZckfXr88tysSaG0zISJkxNHedZ5WQls4KZihaaO2HyWkoBDqRhZUUzXQqohbQMnC4ylzNZOM4qPkd3U-_g-6_Rhqi2_ei7dFKxTNBUmVAkF5tcxvcheOtUer_V_qgoqBNKNaFUCaX6QakOKcSnUEjmbmP9X_U_qW8feng-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2541857188</pqid></control><display><type>article</type><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><source>Springer Nature</source><creator>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</creator><creatorcontrib>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</creatorcontrib><description>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</description><identifier>ISSN: 0942-4962</identifier><identifier>EISSN: 1432-1882</identifier><identifier>DOI: 10.1007/s00530-020-00734-w</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Cloud computing ; Computer Communication Networks ; Computer Graphics ; Computer Science ; Cryptology ; Data Storage Representation ; Encryption ; Image management ; Image retrieval ; Low Complexity Methods for Multimedia Security ; Operating Systems ; Privacy ; Special Issue Paper ; Tracking</subject><ispartof>Multimedia systems, 2021-06, Vol.27 (3), p.403-415</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</citedby><cites>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Wang, Zhangdong</creatorcontrib><creatorcontrib>Qin, Jiaohua</creatorcontrib><creatorcontrib>Xiang, Xuyu</creatorcontrib><creatorcontrib>Tan, Yun</creatorcontrib><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><title>Multimedia systems</title><addtitle>Multimedia Systems</addtitle><description>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Computer Communication Networks</subject><subject>Computer Graphics</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Storage Representation</subject><subject>Encryption</subject><subject>Image management</subject><subject>Image retrieval</subject><subject>Low Complexity Methods for Multimedia Security</subject><subject>Operating Systems</subject><subject>Privacy</subject><subject>Special Issue Paper</subject><subject>Tracking</subject><issn>0942-4962</issn><issn>1432-1882</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEUhYMoWKt_wFXAdfTmMTOZZSlqhYIbXYdMJqlTOw-TTEv_vakjuHNxOXA551zuh9AthXsKUDwEgIwDAZYGCi7I4QzNqOCMUCnZOZpBKRgRZc4u0VUIWwBa5BxmSC_w4Ju9NkcyeBus3zfdBuuuxtHrJvb-pObztDR9F20XSaWDrXHT6o3F3kbf2L3e4WA-bGtx02Gz68c6udthjCl3jS6c3gV786tz9P70-LZckfXr88tysSaG0zISJkxNHedZ5WQls4KZihaaO2HyWkoBDqRhZUUzXQqohbQMnC4ylzNZOM4qPkd3U-_g-6_Rhqi2_ei7dFKxTNBUmVAkF5tcxvcheOtUer_V_qgoqBNKNaFUCaX6QakOKcSnUEjmbmP9X_U_qW8feng-</recordid><startdate>20210601</startdate><enddate>20210601</enddate><creator>Wang, Zhangdong</creator><creator>Qin, Jiaohua</creator><creator>Xiang, Xuyu</creator><creator>Tan, Yun</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210601</creationdate><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><author>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Computer Communication Networks</topic><topic>Computer Graphics</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Storage Representation</topic><topic>Encryption</topic><topic>Image management</topic><topic>Image retrieval</topic><topic>Low Complexity Methods for Multimedia Security</topic><topic>Operating Systems</topic><topic>Privacy</topic><topic>Special Issue Paper</topic><topic>Tracking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Zhangdong</creatorcontrib><creatorcontrib>Qin, Jiaohua</creatorcontrib><creatorcontrib>Xiang, Xuyu</creatorcontrib><creatorcontrib>Tan, Yun</creatorcontrib><collection>CrossRef</collection><jtitle>Multimedia systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Zhangdong</au><au>Qin, Jiaohua</au><au>Xiang, Xuyu</au><au>Tan, Yun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</atitle><jtitle>Multimedia systems</jtitle><stitle>Multimedia Systems</stitle><date>2021-06-01</date><risdate>2021</risdate><volume>27</volume><issue>3</issue><spage>403</spage><epage>415</epage><pages>403-415</pages><issn>0942-4962</issn><eissn>1432-1882</eissn><abstract>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00530-020-00734-w</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0942-4962
ispartof Multimedia systems, 2021-06, Vol.27 (3), p.403-415
issn 0942-4962
1432-1882
language eng
recordid cdi_proquest_journals_2541857188
source Springer Nature
subjects Algorithms
Cloud computing
Computer Communication Networks
Computer Graphics
Computer Science
Cryptology
Data Storage Representation
Encryption
Image management
Image retrieval
Low Complexity Methods for Multimedia Security
Operating Systems
Privacy
Special Issue Paper
Tracking
title A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A43%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20privacy-preserving%20and%20traitor%20tracking%20content-based%20image%20retrieval%20scheme%20in%20cloud%20computing&rft.jtitle=Multimedia%20systems&rft.au=Wang,%20Zhangdong&rft.date=2021-06-01&rft.volume=27&rft.issue=3&rft.spage=403&rft.epage=415&rft.pages=403-415&rft.issn=0942-4962&rft.eissn=1432-1882&rft_id=info:doi/10.1007/s00530-020-00734-w&rft_dat=%3Cproquest_cross%3E2541857188%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2541857188&rft_id=info:pmid/&rfr_iscdi=true