2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) 2015
DOI: 10.1109/embc.2015.7319009
|View full text |Cite
|
Sign up to set email alerts
|

Content-based image retrieval in homomorphic encryption domain

Abstract: In this paper, we propose a secure implementation of a content-based image retrieval (CBIR) method that makes possible diagnosis aid systems to work in externalized environment and with outsourced data as in cloud computing. This one works with homomorphic encrypted images from which it extracts wavelet based image features next used for subsequent image comparison. By doing so, our system allows a physician to retrieve the most similar images to a query image in an outsourced database while preserving data co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…This approach also extracts the features from the encrypted regions, since the feature extraction algorithm can't differentiate the encrypted and unencrypted regions. Homomorphic encryption is also used to preserve privacy, where the authors Bellafqira et al [14] used a histogram of wavelet coefficients that was extracted from the encrypted image that was extracted by the Paillier algorithm. The similarity between the features present in the database and the features of the query image are matched using 𝐿 1 distance.…”
Section: Related Workmentioning
confidence: 99%
“…This approach also extracts the features from the encrypted regions, since the feature extraction algorithm can't differentiate the encrypted and unencrypted regions. Homomorphic encryption is also used to preserve privacy, where the authors Bellafqira et al [14] used a histogram of wavelet coefficients that was extracted from the encrypted image that was extracted by the Paillier algorithm. The similarity between the features present in the database and the features of the query image are matched using 𝐿 1 distance.…”
Section: Related Workmentioning
confidence: 99%
“…Supposing there are N images with M -dimension features in the database, the proposed algorithm implements O(MN ) times of multiplication and exponentiation operations. Unlike the work [242] which exploits local image features, the method in [243] was the first secure CBIR scheme over global image features, based on the wavelet transform [258]. The operations of image retrieval are performed by the cloud server on the encrypted domain, due to the additively homomorphic property of the Paillier cryptosystem.…”
Section: ) Image Feature Extractionmentioning
confidence: 99%
“…The query results are obtained through homomorphic operations between the encrypted query and the encrypted data. A lot of researchers have proposed secure information retrieval schemes based on homomorphic encryption [33][34][35][36]. Meng Shen et al proposed a graph encryption scheme which makes use of SWHE and enables approximate Constrained Shortest Distance (CSD) querying over encrypted graph [37].…”
Section: Applications Of Homomorphic Encryption Schemesmentioning
confidence: 99%