A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing

Zhangdong Wang,Jiaohua Qin,Xuyu Xiang,Yun Tan
DOI: https://doi.org/10.1007/s00530-020-00734-w
IF: 3.9
2021-01-09
Multimedia Systems
Abstract:To ensure the image security, a large number of ciphertext image retrieval methods have been studied and applied, such as homomorphic encryption and multi-key encryption. However, most of these algorithms do not consider the protection of image copyright, user information and traitor tracking. For this reason, this paper proposes a privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. This method introduces the DenseNet network to strengthen statistical features. One-way hash algorithm and XOR operation are used to protect copyright and user information, and reversible information hiding algorithm is accessed for traitor tracking. Experimental results show that compared with other algorithms that support leak tracking, our method achieves higher retrieval precision, higher retrieval efficiency and simpler architecture.
computer science, information systems, theory & methods
What problem does this paper attempt to address?