{"title":"An Efficient Content Based Image Retrieval Scheme with Preserving the Security of Images*","authors":"Mukul Majhi, Jitesh Pradhan, Arup Kumar Pal","doi":"10.1109/SPIN.2019.8711651","DOIUrl":null,"url":null,"abstract":"In this paper, an efficient content based image retrieval scheme is proposed which incorporates the security of images in a retrieval system. The main contribution of the proposed scheme is two folded that is to develop an efficient image retrieval process, and to provide security to the retrieved images. To achieve this goal, features from the foreground region as well as background features are extracted, where more importance is given to the foreground region which is identified based on Itti Koch Saliency Map. From the obtained foreground region texture features along with color features are extracted. Simultaneously, the background is divided into four regions and color features are extracted. Finally, the foreground and background features are combined to perform image retrieval process. Now to prevent the feature vector from illegitimate users, suitable cryptographic approaches are used to provide security in terms of confidentiality and integrity. To protect the integrity, the hash value of the feature vector is computed and the obtained hash value along with feature vector are enciphered together. This enciphered value is then communicated to the user. The content owner verifies the integrity of the feature and performs the retrieval process. The retrieved results are then watermarked to protect copyright and are further enciphered so that unauthorized user's cannot access the images. This security mechanism ensures that the retrieved images are shared only to the authorized user. The retrieval process is performed on Corel dataset and the results are comparable to the existing state-of-arts methods. Finally, this process is suitable to protect the security of images in a retrieval system.","PeriodicalId":344030,"journal":{"name":"2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN.2019.8711651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper, an efficient content based image retrieval scheme is proposed which incorporates the security of images in a retrieval system. The main contribution of the proposed scheme is two folded that is to develop an efficient image retrieval process, and to provide security to the retrieved images. To achieve this goal, features from the foreground region as well as background features are extracted, where more importance is given to the foreground region which is identified based on Itti Koch Saliency Map. From the obtained foreground region texture features along with color features are extracted. Simultaneously, the background is divided into four regions and color features are extracted. Finally, the foreground and background features are combined to perform image retrieval process. Now to prevent the feature vector from illegitimate users, suitable cryptographic approaches are used to provide security in terms of confidentiality and integrity. To protect the integrity, the hash value of the feature vector is computed and the obtained hash value along with feature vector are enciphered together. This enciphered value is then communicated to the user. The content owner verifies the integrity of the feature and performs the retrieval process. The retrieved results are then watermarked to protect copyright and are further enciphered so that unauthorized user's cannot access the images. This security mechanism ensures that the retrieved images are shared only to the authorized user. The retrieval process is performed on Corel dataset and the results are comparable to the existing state-of-arts methods. Finally, this process is suitable to protect the security of images in a retrieval system.