An Efficient Content Based Image Retrieval Scheme with Preserving the Security of Images*

Mukul Majhi, Jitesh Pradhan, Arup Kumar Pal
{"title":"An Efficient Content Based Image Retrieval Scheme with Preserving the Security of Images*","authors":"Mukul Majhi, Jitesh Pradhan, Arup Kumar Pal","doi":"10.1109/SPIN.2019.8711651","DOIUrl":null,"url":null,"abstract":"In this paper, an efficient content based image retrieval scheme is proposed which incorporates the security of images in a retrieval system. The main contribution of the proposed scheme is two folded that is to develop an efficient image retrieval process, and to provide security to the retrieved images. To achieve this goal, features from the foreground region as well as background features are extracted, where more importance is given to the foreground region which is identified based on Itti Koch Saliency Map. From the obtained foreground region texture features along with color features are extracted. Simultaneously, the background is divided into four regions and color features are extracted. Finally, the foreground and background features are combined to perform image retrieval process. Now to prevent the feature vector from illegitimate users, suitable cryptographic approaches are used to provide security in terms of confidentiality and integrity. To protect the integrity, the hash value of the feature vector is computed and the obtained hash value along with feature vector are enciphered together. This enciphered value is then communicated to the user. The content owner verifies the integrity of the feature and performs the retrieval process. The retrieved results are then watermarked to protect copyright and are further enciphered so that unauthorized user's cannot access the images. This security mechanism ensures that the retrieved images are shared only to the authorized user. The retrieval process is performed on Corel dataset and the results are comparable to the existing state-of-arts methods. Finally, this process is suitable to protect the security of images in a retrieval system.","PeriodicalId":344030,"journal":{"name":"2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN.2019.8711651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In this paper, an efficient content based image retrieval scheme is proposed which incorporates the security of images in a retrieval system. The main contribution of the proposed scheme is two folded that is to develop an efficient image retrieval process, and to provide security to the retrieved images. To achieve this goal, features from the foreground region as well as background features are extracted, where more importance is given to the foreground region which is identified based on Itti Koch Saliency Map. From the obtained foreground region texture features along with color features are extracted. Simultaneously, the background is divided into four regions and color features are extracted. Finally, the foreground and background features are combined to perform image retrieval process. Now to prevent the feature vector from illegitimate users, suitable cryptographic approaches are used to provide security in terms of confidentiality and integrity. To protect the integrity, the hash value of the feature vector is computed and the obtained hash value along with feature vector are enciphered together. This enciphered value is then communicated to the user. The content owner verifies the integrity of the feature and performs the retrieval process. The retrieved results are then watermarked to protect copyright and are further enciphered so that unauthorized user's cannot access the images. This security mechanism ensures that the retrieved images are shared only to the authorized user. The retrieval process is performed on Corel dataset and the results are comparable to the existing state-of-arts methods. Finally, this process is suitable to protect the security of images in a retrieval system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种有效的基于内容的图像检索方案,并保证图像的安全性*
本文提出了一种高效的基于内容的图像检索方案,该方案兼顾了检索系统中图像的安全性。该方案的主要贡献有两个方面:一是开发了一种高效的图像检索过程,二是为检索到的图像提供了安全性。为了实现这一目标,从前景区域提取特征,同时提取背景特征,其中更重视基于Itti Koch显著性图识别的前景区域。从得到的前景区域提取纹理特征和颜色特征。同时,将背景划分为4个区域,提取颜色特征。最后,结合前景和背景特征进行图像检索。现在,为了防止非法用户使用特征向量,使用合适的加密方法来提供机密性和完整性方面的安全性。为了保护完整性,计算特征向量的哈希值,并将得到的哈希值与特征向量一起加密。然后将这个加密值传递给用户。内容所有者验证特性的完整性并执行检索过程。然后对检索到的结果进行水印以保护版权,并进一步进行加密,使未经授权的用户无法访问图像。这种安全机制确保检索到的图像仅供授权用户共享。检索过程在Corel数据集上执行,结果与现有最先进的方法相当。最后,该方法适用于保护检索系统中图像的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data Classification by Reducing Bias of Domain-Oriented Knowledge Based on Data Jackets A Robust Automatic Algorithm for Statistical Analysis and Classification of Lung Auscultations Modified Dispersion Equation for Planar Open Tape Helix Travelling Wave Tube Experimental Analysis of Power Generation for Ultra-Low Power Wireless Sensor Nodes Using Various Coatings on Thermoelectric Energy Harvester A Novel Reconfigurable Patch Antenna with Parasitic Patch
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1