Loading…
A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For t...
Saved in:
Published in: | Multimedia systems 2021-06, Vol.27 (3), p.403-415 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3 |
container_end_page | 415 |
container_issue | 3 |
container_start_page | 403 |
container_title | Multimedia systems |
container_volume | 27 |
creator | Wang, Zhangdong Qin, Jiaohua Xiang, Xuyu Tan, Yun |
description | To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture. |
doi_str_mv | 10.1007/s00530-020-00734-w |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2541857188</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2541857188</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKt_wFXAdfTmMTOZZSlqhYIbXYdMJqlTOw-TTEv_vakjuHNxOXA551zuh9AthXsKUDwEgIwDAZYGCi7I4QzNqOCMUCnZOZpBKRgRZc4u0VUIWwBa5BxmSC_w4Ju9NkcyeBus3zfdBuuuxtHrJvb-pObztDR9F20XSaWDrXHT6o3F3kbf2L3e4WA-bGtx02Gz68c6udthjCl3jS6c3gV786tz9P70-LZckfXr88tysSaG0zISJkxNHedZ5WQls4KZihaaO2HyWkoBDqRhZUUzXQqohbQMnC4ylzNZOM4qPkd3U-_g-6_Rhqi2_ei7dFKxTNBUmVAkF5tcxvcheOtUer_V_qgoqBNKNaFUCaX6QakOKcSnUEjmbmP9X_U_qW8feng-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2541857188</pqid></control><display><type>article</type><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><source>Springer Nature</source><creator>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</creator><creatorcontrib>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</creatorcontrib><description>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</description><identifier>ISSN: 0942-4962</identifier><identifier>EISSN: 1432-1882</identifier><identifier>DOI: 10.1007/s00530-020-00734-w</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Cloud computing ; Computer Communication Networks ; Computer Graphics ; Computer Science ; Cryptology ; Data Storage Representation ; Encryption ; Image management ; Image retrieval ; Low Complexity Methods for Multimedia Security ; Operating Systems ; Privacy ; Special Issue Paper ; Tracking</subject><ispartof>Multimedia systems, 2021-06, Vol.27 (3), p.403-415</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</citedby><cites>FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Wang, Zhangdong</creatorcontrib><creatorcontrib>Qin, Jiaohua</creatorcontrib><creatorcontrib>Xiang, Xuyu</creatorcontrib><creatorcontrib>Tan, Yun</creatorcontrib><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><title>Multimedia systems</title><addtitle>Multimedia Systems</addtitle><description>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Computer Communication Networks</subject><subject>Computer Graphics</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Storage Representation</subject><subject>Encryption</subject><subject>Image management</subject><subject>Image retrieval</subject><subject>Low Complexity Methods for Multimedia Security</subject><subject>Operating Systems</subject><subject>Privacy</subject><subject>Special Issue Paper</subject><subject>Tracking</subject><issn>0942-4962</issn><issn>1432-1882</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEUhYMoWKt_wFXAdfTmMTOZZSlqhYIbXYdMJqlTOw-TTEv_vakjuHNxOXA551zuh9AthXsKUDwEgIwDAZYGCi7I4QzNqOCMUCnZOZpBKRgRZc4u0VUIWwBa5BxmSC_w4Ju9NkcyeBus3zfdBuuuxtHrJvb-pObztDR9F20XSaWDrXHT6o3F3kbf2L3e4WA-bGtx02Gz68c6udthjCl3jS6c3gV786tz9P70-LZckfXr88tysSaG0zISJkxNHedZ5WQls4KZihaaO2HyWkoBDqRhZUUzXQqohbQMnC4ylzNZOM4qPkd3U-_g-6_Rhqi2_ei7dFKxTNBUmVAkF5tcxvcheOtUer_V_qgoqBNKNaFUCaX6QakOKcSnUEjmbmP9X_U_qW8feng-</recordid><startdate>20210601</startdate><enddate>20210601</enddate><creator>Wang, Zhangdong</creator><creator>Qin, Jiaohua</creator><creator>Xiang, Xuyu</creator><creator>Tan, Yun</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210601</creationdate><title>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</title><author>Wang, Zhangdong ; Qin, Jiaohua ; Xiang, Xuyu ; Tan, Yun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Computer Communication Networks</topic><topic>Computer Graphics</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Storage Representation</topic><topic>Encryption</topic><topic>Image management</topic><topic>Image retrieval</topic><topic>Low Complexity Methods for Multimedia Security</topic><topic>Operating Systems</topic><topic>Privacy</topic><topic>Special Issue Paper</topic><topic>Tracking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Zhangdong</creatorcontrib><creatorcontrib>Qin, Jiaohua</creatorcontrib><creatorcontrib>Xiang, Xuyu</creatorcontrib><creatorcontrib>Tan, Yun</creatorcontrib><collection>CrossRef</collection><jtitle>Multimedia systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Zhangdong</au><au>Qin, Jiaohua</au><au>Xiang, Xuyu</au><au>Tan, Yun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing</atitle><jtitle>Multimedia systems</jtitle><stitle>Multimedia Systems</stitle><date>2021-06-01</date><risdate>2021</risdate><volume>27</volume><issue>3</issue><spage>403</spage><epage>415</epage><pages>403-415</pages><issn>0942-4962</issn><eissn>1432-1882</eissn><abstract>To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s00530-020-00734-w</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0942-4962 |
ispartof | Multimedia systems, 2021-06, Vol.27 (3), p.403-415 |
issn | 0942-4962 1432-1882 |
language | eng |
recordid | cdi_proquest_journals_2541857188 |
source | Springer Nature |
subjects | Algorithms Cloud computing Computer Communication Networks Computer Graphics Computer Science Cryptology Data Storage Representation Encryption Image management Image retrieval Low Complexity Methods for Multimedia Security Operating Systems Privacy Special Issue Paper Tracking |
title | A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A43%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20privacy-preserving%20and%20traitor%20tracking%20content-based%20image%20retrieval%20scheme%20in%20cloud%20computing&rft.jtitle=Multimedia%20systems&rft.au=Wang,%20Zhangdong&rft.date=2021-06-01&rft.volume=27&rft.issue=3&rft.spage=403&rft.epage=415&rft.pages=403-415&rft.issn=0942-4962&rft.eissn=1432-1882&rft_id=info:doi/10.1007/s00530-020-00734-w&rft_dat=%3Cproquest_cross%3E2541857188%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-24cd1f335bf8b8572cb17a3f4c6d8840f08c29b15a940d48e20fa75f6287f32b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2541857188&rft_id=info:pmid/&rfr_iscdi=true |