Open Access   Article Go Back

A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing

K.Anitha 1 , P. Madhura2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 128-131, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.128131

Online published on Mar 20, 2019

Copyright © K.Anitha, P. Madhura . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Anitha, P. Madhura, “A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.128-131, 2019.

MLA Style Citation: K.Anitha, P. Madhura "A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing." International Journal of Computer Sciences and Engineering 07.06 (2019): 128-131.

APA Style Citation: K.Anitha, P. Madhura, (2019). A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing. International Journal of Computer Sciences and Engineering, 07(06), 128-131.

BibTex Style Citation:
@article{Madhura_2019,
author = {K.Anitha, P. Madhura},
title = {A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {128-131},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=883},
doi = {https://doi.org/10.26438/ijcse/v7i6.128131}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.128131}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=883
TI - A Review of Security Technique for Content-Based Image Retrieval in the Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - K.Anitha, P. Madhura
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 128-131
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Content-based picture recuperation (CBIR) applications had been fast created along the enlargement in the quantity, accessibility and importance of pix in our day by day existence. Be that as it may, the huge association of CBIR conspire has been constrained with the aid of it`s the extreme calculation and potential prerequisite. Content Based Image Retrieval (CBIR) is an efficient retrieval of relevant images from large databases based on features extracted from the image. This paper proposes a system that can be used for retrieving images related to a query image from a large set of distinct images. It follows an image segmentation based approach to extract the different features present in an image. The above features which can be stored in vectors called feature vectors and therefore these are compared to the feature vectors of query image and the image information is sorted in decreasing order of similarity. The processing of the same is done on cloud. The CBIR system is an application built on Windows Azure platform. It is a parallel processing problem where a large set of images have to be operated upon to rank them based on a similarity to a provided query image by the user. Numerous instances of the algorithm run on the virtual machines provided in the Microsoft data centers, which run Windows Azure. Windows Azure is the operating system for the cloud by Microsoft Incorporation.

Key-Words / Index Term

Cloud computing, image retrieval, encryption techniques, LP transformation

References

[1] C. Pavlopoulou, A. C. Kak, and C. E. Brodley, “Content-based image retrieval for medical imagery,” in Medical Imaging 2003. International Society for Optics and Photonics, 2003, pp. 85–96.
[2] A. K. Jain, J.-E. Lee, R. Jin, and N. Gregg, “Content-based image retrieval: An application to tattoo images,” in Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, 2009, pp. 2745–2748.
[3] J. M. Lewin, R. E. Hendrick, C. J. DOrsi, P. K. Isaacs, L. J. Moss, A. Karellas, G. A. Sisney, C. C. Kuni, and G. R. Cutter, “Comparison of full-field digital mammography with screen-film mammography for cancer detection: Results of 4,945 paired examinations 1,” Radiology, vol. 218, no. 3, pp. 873–880, 2001.
[4] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44–55.
[5] E.-J. Goh et al., “Secure indexes.” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.
[6] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79–88.
[7] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data,” in Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE, 2012, pp. 1156–1167.
[8] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,” in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 451–459.
[9] Z. Xia, Y. Zhu, X. Sun, and L. Chen, “Secure semantic expansion based search over encrypted cloud data supporting similarity ranking,” Journal of Cloud Computing, vol. 3, no. 1, pp. 1–11, 2014.
[10] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 2013, pp. 71–82.
[11] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[12] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. PP, no. 99, p. 1, 2015.
[13] S. Kamara and C. Papamanthou, “Parallel and dynamic searchable symmetric encryption,” in Financial Cryptography and Data Security. Springer, 2013, pp. 258–274.
[14] D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, “Dynamic searchable encryption in very large databases: Data structures and implementation,” in Proc. of NDSS, vol. 14, 2014.
[15] J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar, “Private content based image retrieval,” in Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE, 2008, pp. 1–8. [16] C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, “Secure and robust SIFT,” in Proceedings of the 17th ACM international conference on Multimedia. ACM, 2009, pp. 637–640.
[17] ——, “Image feature extraction in encrypted domain with privacy preserving SIFT,” Image Processing, IEEE Transactions on, vol. 21, no. 11, pp. 4593–4607, 2012.
[18] P. Zheng and J. Huang, “An efficient image homomorphism encryption scheme with small cipher text expansion,” in Proceedings of the 21st ACM international conference on Multimedia. ACM, 2013, pp. 803–812.
[19] Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient privacy-preserving image feature extraction in cloud computing,” in Proceedings of the ACM International Conference on Multimedia. ACM, 2014, pp. 497–506.
[20] W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, “Enabling search over encrypted multimedia databases,” in IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2009, pp. 725 418–725 418