Encrypted Image Retrieval System based on Features Analysis

Abstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure...

Full description

Saved in:
Bibliographic Details
Main Authors: Methaq Talib GAATA, Fadya Fouad Hantoosh
Format: Article
Language:English
Published: Mustansiriyah University 2018-07-01
Series:Al-Mustansiriyah Journal of Science
Subjects:
Online Access:http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850162138051510272
author Methaq Talib GAATA
Fadya Fouad Hantoosh
author_facet Methaq Talib GAATA
Fadya Fouad Hantoosh
author_sort Methaq Talib GAATA
collection DOAJ
description Abstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure content-based image retrieval system is becoming an increasingly demanding task as never before. This paper, presents a mechanism that addresses the secure CBIR as a novel improvement and application for the image retrieval. The proposed system consists of six phases briefly described as follows: first, feature extraction phase, which produces the low-level quantitative description of the image (color and texture) that allows the computation of similarity measures, the definition of the ordering of the images, and the indexing of the search processes. Second, indexing for search process phase, hash table and bloom filter were employed for classification. Third, feature encryption phase, where content protection is performed using a method developed by us (including Chaotic Logistic Map). Fourth,  image encryption phase, as security mechanism for CBIR, we combine two research fields in computer science, CBIR and image cryptography, which grow up to meet the trends of security and speed in current computer sciences, chaos and stream cipher systems were applied as an image encryption system. Fifth, the retrieval phase, which provides a subset of images answering the query based on the similarity between images computed over the feature vector extracted from each image. Finally, Relevance feedback phase, a technique that attempts to capture the user’s needs through iterative feedback. Although the system proved its efficiency in search performance (with 88% of average precision), security strength, and computational complexity, it does not mean the optimal system is designed, since some weakness points still can be found that are suggested to be improved as a future work.
format Article
id doaj-art-cfaa1d328bed43afbb97c2bb94108ca5
institution OA Journals
issn 1814-635X
2521-3520
language English
publishDate 2018-07-01
publisher Mustansiriyah University
record_format Article
series Al-Mustansiriyah Journal of Science
spelling doaj-art-cfaa1d328bed43afbb97c2bb94108ca52025-08-20T02:22:38ZengMustansiriyah UniversityAl-Mustansiriyah Journal of Science1814-635X2521-35202018-07-0128316617310.23851/mjs.v28i3.7755Encrypted Image Retrieval System based on Features AnalysisMethaq Talib GAATA0Fadya Fouad HantooshAL-Mustansiriyah UniversityAbstract – Content-based search provides an important tool for users to consume the ever-growing digital media repositories. However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. Hence, the design of secure content-based image retrieval system is becoming an increasingly demanding task as never before. This paper, presents a mechanism that addresses the secure CBIR as a novel improvement and application for the image retrieval. The proposed system consists of six phases briefly described as follows: first, feature extraction phase, which produces the low-level quantitative description of the image (color and texture) that allows the computation of similarity measures, the definition of the ordering of the images, and the indexing of the search processes. Second, indexing for search process phase, hash table and bloom filter were employed for classification. Third, feature encryption phase, where content protection is performed using a method developed by us (including Chaotic Logistic Map). Fourth,  image encryption phase, as security mechanism for CBIR, we combine two research fields in computer science, CBIR and image cryptography, which grow up to meet the trends of security and speed in current computer sciences, chaos and stream cipher systems were applied as an image encryption system. Fifth, the retrieval phase, which provides a subset of images answering the query based on the similarity between images computed over the feature vector extracted from each image. Finally, Relevance feedback phase, a technique that attempts to capture the user’s needs through iterative feedback. Although the system proved its efficiency in search performance (with 88% of average precision), security strength, and computational complexity, it does not mean the optimal system is designed, since some weakness points still can be found that are suggested to be improved as a future work.http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter.
spellingShingle Methaq Talib GAATA
Fadya Fouad Hantoosh
Encrypted Image Retrieval System based on Features Analysis
Al-Mustansiriyah Journal of Science
Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter.
title Encrypted Image Retrieval System based on Features Analysis
title_full Encrypted Image Retrieval System based on Features Analysis
title_fullStr Encrypted Image Retrieval System based on Features Analysis
title_full_unstemmed Encrypted Image Retrieval System based on Features Analysis
title_short Encrypted Image Retrieval System based on Features Analysis
title_sort encrypted image retrieval system based on features analysis
topic Content Based Image Retrieval, Secure Content Based Image Retrieval, Image Mining, Similar Image Retrieval, Bloom Filter.
url http://mjs.uomustansiriyah.edu.iq/ojs1/index.php/MJS/article/view/77
work_keys_str_mv AT methaqtalibgaata encryptedimageretrievalsystembasedonfeaturesanalysis
AT fadyafouadhantoosh encryptedimageretrievalsystembasedonfeaturesanalysis