TY - JOUR
T1 - A Privacy-Preserving Image Retrieval Scheme Based on 16×16 DCT and Deep Learning
AU - Lu, Zhixun
AU - Feng, Qihua
AU - Li, Peiya
AU - Lo, Kwok Tung
AU - Huang, Feiran
N1 - Funding Information:
This work was supported in part by the National Key R&D Program of China under Grant 2022YFB3103500, in part by GuangDong Basic and Applied Basic Research Foundation under Grants 2020A1515110513 and 2022A1515011960, and in part by the National Natural Science Foundation of China under Grants 62032025 and 61932010
Publisher Copyright:
© 2013 IEEE.
PY - 2023/7/1
Y1 - 2023/7/1
N2 - In recent years, people tend to upload images to cloud servers, which provide storage and retrieval functions. To prevent users' privacy from leaking to the server, research on cipher-image retrieval has attracted much attention. This work presents a novel encrypted image retrieval method. With this scheme, we perform encryption during the JPEG compression process by applying 16×16 DCT (Discrete Cosine Transform) for blocks' transformation, followed by coefficients distribution and 8×8 blocks' permutation. For the retrieval part, when an encrypted query image is sent by an authorized user, the server extracts its DCT histograms as features and inputs them into our trained network model, which incorporates transpose Multilayer perceptron modules (TransposeTranspose MLPMLP), for retrieval. Experimental results show that our scheme, compared with related schemes, can improve the retrieval performance significantly, when ensuring compression friendliness and no feature information leakage. Moreover, our scheme enables cipher-image retrieval from multiple image owners.
AB - In recent years, people tend to upload images to cloud servers, which provide storage and retrieval functions. To prevent users' privacy from leaking to the server, research on cipher-image retrieval has attracted much attention. This work presents a novel encrypted image retrieval method. With this scheme, we perform encryption during the JPEG compression process by applying 16×16 DCT (Discrete Cosine Transform) for blocks' transformation, followed by coefficients distribution and 8×8 blocks' permutation. For the retrieval part, when an encrypted query image is sent by an authorized user, the server extracts its DCT histograms as features and inputs them into our trained network model, which incorporates transpose Multilayer perceptron modules (TransposeTranspose MLPMLP), for retrieval. Experimental results show that our scheme, compared with related schemes, can improve the retrieval performance significantly, when ensuring compression friendliness and no feature information leakage. Moreover, our scheme enables cipher-image retrieval from multiple image owners.
KW - Cipher-image retrieval
KW - JPEG
KW - multilayer perceptron
KW - neural network
KW - privacy preservation
UR - http://www.scopus.com/inward/record.url?scp=85162620831&partnerID=8YFLogxK
U2 - 10.1109/TCC.2023.3286119
DO - 10.1109/TCC.2023.3286119
M3 - Journal article
AN - SCOPUS:85162620831
SN - 2168-7161
VL - 11
SP - 3314
EP - 3325
JO - IEEE Transactions on Cloud Computing
JF - IEEE Transactions on Cloud Computing
IS - 3
M1 - 10152501
ER -