A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images

10/31/2020
by   Kenta Iida, et al.
0

In this paper, we propose a novel content based-image retrieval scheme allowing the mixed use of encrypted and plain images for the first time. In the proposed scheme, images are encrypted by a block-scrambling method developed for encryption-then-compression (EtC) systems. The encrypted images, referred to as EtC images, can be compressed with JPEG, as well as for plain images. Image descriptors used for the proposed retrieval is designed to avoid the effect of image encryption. As a result, the use of EtC images and the descriptors allows us to carry out retrieval of both encrypted images and plain ones. In an experiment, the proposed scheme is demonstrated to have the same performance as conventional retrieval methods with plain images, even under the mixed use of plain images and EtC ones.

READ FULL TEXT

page 1

page 3

page 5

research
02/01/2022

A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images

In this paper, we propose a novel content-based image-retrieval scheme t...
research
08/17/2018

Bitstream-Based JPEG Image Encryption with File-Size Preserving

An encryption scheme of JPEG images in the bitstream domain is proposed....
research
06/23/2018

Robust Image Identification for Double-Compressed JPEG Images

It is known that JPEG images uploaded to social networks (SNs) are mostl...
research
09/04/2021

A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated From Independent Plain-Image Dataset

In this paper, we propose a privacy-preserving image-retrieval scheme us...
research
08/25/2022

A Privacy-Preserving and End-to-End-Based Encrypted Image Retrieval Scheme

Applying encryption technology to image retrieval can ensure the securit...
research
04/26/2015

Fast Dictionary Matching for Content-based Image Retrieval

This paper describes a method for searching for common sets of descripto...
research
07/16/2023

Format Preserving Encryption in the Bounded Retrieval Model

In the bounded retrieval model, the adversary can leak a certain amount ...

Please sign up or login with your details

Forgot password? Click here to reset