Encrypted Image Retrieval System based on Features Analysis
Abstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mustansiriyah University
2018-07-01
|
| Series: | Al-Mustansiriyah Journal of Science |
| Subjects: | |
| Online Access: | http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850162138051510272 |
|---|---|
| author | Methaq Talib GAATA Fadya Fouad Hantoosh |
| author_facet | Methaq Talib GAATA Fadya Fouad Hantoosh |
| author_sort | Methaq Talib GAATA |
| collection | DOAJ |
| description | Abstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure content-based image retrieval system is becoming an increasingly demanding task as never before. This paper, presents a mechanism that addresses the secure CBIR as a novel improvement and application for the image retrieval. The proposed system consists of six phases briefly described as follows: first, feature extraction phase, which produces the low-level quantitative description of the image (color and texture) that allows the computation of similarity measures, the definition of the ordering of the images, and the indexing of the search processes. Second, indexing for search process phase, hash table and bloom filter were employed for classification. Third, feature encryption phase, where content protection is performed using a method developed by us (including Chaotic Logistic Map). Fourth, image encryption phase, as security mechanism for CBIR, we combine two research fields in computer science, CBIR and image cryptography, which grow up to meet the trends of security and speed in current computer sciences, chaos and stream cipher systems were applied as an image encryption system. Fifth, the retrieval phase, which provides a subset of images answering the query based on the similarity between images computed over the feature vector extracted from each image. Finally, Relevance feedback phase, a technique that attempts to capture the user’s needs through iterative feedback. Although the system proved its efficiency in search performance (with 88% of average precision), security strength, and computational complexity, it does not mean the optimal system is designed, since some weakness points still can be found that are suggested to be improved as a future work. |
| format | Article |
| id | doaj-art-cfaa1d328bed43afbb97c2bb94108ca5 |
| institution | OA Journals |
| issn | 1814-635X 2521-3520 |
| language | English |
| publishDate | 2018-07-01 |
| publisher | Mustansiriyah University |
| record_format | Article |
| series | Al-Mustansiriyah Journal of Science |
| spelling | doaj-art-cfaa1d328bed43afbb97c2bb94108ca52025-08-20T02:22:38ZengMustansiriyah UniversityAl-Mustansiriyah Journal of Science1814-635X2521-35202018-07-0128316617310.23851/mjs.v28i3.7755Encrypted Image Retrieval System based on Features AnalysisMethaq Talib GAATA0Fadya Fouad HantooshAL-Mustansiriyah UniversityAbstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure content-based image retrieval system is becoming an increasingly demanding task as never before. This paper, presents a mechanism that addresses the secure CBIR as a novel improvement and application for the image retrieval. The proposed system consists of six phases briefly described as follows: first, feature extraction phase, which produces the low-level quantitative description of the image (color and texture) that allows the computation of similarity measures, the definition of the ordering of the images, and the indexing of the search processes. Second, indexing for search process phase, hash table and bloom filter were employed for classification. Third, feature encryption phase, where content protection is performed using a method developed by us (including Chaotic Logistic Map). Fourth, image encryption phase, as security mechanism for CBIR, we combine two research fields in computer science, CBIR and image cryptography, which grow up to meet the trends of security and speed in current computer sciences, chaos and stream cipher systems were applied as an image encryption system. Fifth, the retrieval phase, which provides a subset of images answering the query based on the similarity between images computed over the feature vector extracted from each image. Finally, Relevance feedback phase, a technique that attempts to capture the user’s needs through iterative feedback. Although the system proved its efficiency in search performance (with 88% of average precision), security strength, and computational complexity, it does not mean the optimal system is designed, since some weakness points still can be found that are suggested to be improved as a future work.http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter. |
| spellingShingle | Methaq Talib GAATA Fadya Fouad Hantoosh Encrypted Image Retrieval System based on Features Analysis Al-Mustansiriyah Journal of Science Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter. |
| title | Encrypted Image Retrieval System based on Features Analysis |
| title_full | Encrypted Image Retrieval System based on Features Analysis |
| title_fullStr | Encrypted Image Retrieval System based on Features Analysis |
| title_full_unstemmed | Encrypted Image Retrieval System based on Features Analysis |
| title_short | Encrypted Image Retrieval System based on Features Analysis |
| title_sort | encrypted image retrieval system based on features analysis |
| topic | Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter. |
| url | http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77 |
| work_keys_str_mv | AT methaqtalibgaata encryptedimageretrievalsystembasedonfeaturesanalysis AT fadyafouadhantoosh encryptedimageretrievalsystembasedonfeaturesanalysis |