{"title":"云计算中基于特征融合的加密图像检索新方法","authors":"Jianhua Chen, Jiaohua Qin, Xuyu Xiang, Yun Tan","doi":"10.1504/ijcse.2020.10029222","DOIUrl":null,"url":null,"abstract":"The traditional image retrieval has high requirements on the computing power and storage capacity of the platform, so the cloud server has become the preferred choice for outsourcing image retrieval. However, the cloud server is not completely reliable, and outsourcing image retrieval may bring many security, low retrieval accuracy, and privacy problems. In this paper, an encrypted image retrieval method based on feature fusion is proposed. Firstly, the images are encrypted by the encryption operator. Then, the feature extractor is designed, and the enhanced RGB feature and HSV histogram feature are extracted. Finally, the feature extractor and encrypted images are uploaded to the cloud server. The computation of similarity between images is done in the cloud. The experiments and security analysis show that the proposed method has good security and accuracy.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A new encrypted image retrieval method based on feature fusion in cloud computing\",\"authors\":\"Jianhua Chen, Jiaohua Qin, Xuyu Xiang, Yun Tan\",\"doi\":\"10.1504/ijcse.2020.10029222\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The traditional image retrieval has high requirements on the computing power and storage capacity of the platform, so the cloud server has become the preferred choice for outsourcing image retrieval. However, the cloud server is not completely reliable, and outsourcing image retrieval may bring many security, low retrieval accuracy, and privacy problems. In this paper, an encrypted image retrieval method based on feature fusion is proposed. Firstly, the images are encrypted by the encryption operator. Then, the feature extractor is designed, and the enhanced RGB feature and HSV histogram feature are extracted. Finally, the feature extractor and encrypted images are uploaded to the cloud server. The computation of similarity between images is done in the cloud. The experiments and security analysis show that the proposed method has good security and accuracy.\",\"PeriodicalId\":340410,\"journal\":{\"name\":\"Int. J. Comput. Sci. Eng.\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Comput. Sci. Eng.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijcse.2020.10029222\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Sci. Eng.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcse.2020.10029222","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new encrypted image retrieval method based on feature fusion in cloud computing
The traditional image retrieval has high requirements on the computing power and storage capacity of the platform, so the cloud server has become the preferred choice for outsourcing image retrieval. However, the cloud server is not completely reliable, and outsourcing image retrieval may bring many security, low retrieval accuracy, and privacy problems. In this paper, an encrypted image retrieval method based on feature fusion is proposed. Firstly, the images are encrypted by the encryption operator. Then, the feature extractor is designed, and the enhanced RGB feature and HSV histogram feature are extracted. Finally, the feature extractor and encrypted images are uploaded to the cloud server. The computation of similarity between images is done in the cloud. The experiments and security analysis show that the proposed method has good security and accuracy.