Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure retrieval method for large-scale images in cloud environment

A cloud environment, large-scale technology, used in computer security devices, character and pattern recognition, special data processing applications, etc., can solve the problems of security, accuracy and efficiency

Active Publication Date: 2018-12-07
WUHAN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data owner generates a ciphertext image and an encrypted index and uploads it to the cloud. During the retrieval process, the cloud can return the ciphertext image closest to the query image without decryption, which can effectively solve the problem of existing solutions that cannot balance security, accuracy, and efficiency. The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure retrieval method for large-scale images in cloud environment
  • A secure retrieval method for large-scale images in cloud environment
  • A secure retrieval method for large-scale images in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The present invention provides an image security retrieval method based on the bag-of-words model in a cloud environment. The specific implementation steps are as follows:

[0065] Step 1. Establish a bag-of-words model based on the image database to generate a visual dictionary and a median matrix. Specifically include the following sub-steps:

[0066] Step 1.1, local feature extraction: for each image in the image library, use the sift feature extraction algorithm to extract image features and generate feature point descriptors;

[0067] Step 1.2, build a visual dictionary: use the k-means clustering algorithm to train the feature points in the image training data set to generate k cluster centers, and each cluster center is represented as a visual word, which constitutes a k-dimensional visual dictionary W ;

[0068] Step 1.3, construct the median matrix: calculate the median value in each dimension for the image feature vectors belonging to the c(c∈[1,k])th cluste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of multimedia information security protection, in particular to an image security retrieval method based on the combination of a word bag model and a minimum hash principle, which can be used for the security retrieval of large-scale images. A content owner combines a sack model with the minimum hash principle to construct a secure index of the image features. Inthe safe index data set of image features, the noise index vector is introduced, and the index vector corresponding to some visual words is randomly extracted to construct the safe index table. The image security index table and the encrypted image are uploaded to the cloud server. When the user requests retrieval, the cloud service only searches the index table according to the query image indexinformation, and the user obtains the image to be retrieved according to the similarity between the index vectors. This retrieval method has higher efficiency and is more suitable for large-scale dataset retrieval. The feature vector based on SIFT descriptor and binary signature can achieve high precision matching, and has high retrieval accuracy.

Description

technical field [0001] The invention belongs to the field of multimedia information security protection, and in particular relates to an image security retrieval method based on a bag-of-words model combined with a minimum hash principle, which can be used for security retrieval of large-scale images. Background technique [0002] With the popularization of digital cameras and smart phones, people's access to data has become more and more convenient, and multimedia data such as images has shown an explosive growth trend. A cloud computing platform that integrates grid, parallel processing, and distributed processing provides a strong guarantee for massive data services and application processing with its low cost, powerful computing capabilities, and nearly unlimited resource pools. More and more of users choose to upload image data to a cloud server for storage and processing. However, data outsourced to the cloud is completely out of the direct physical control of its own...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F21/60G06K9/62
CPCG06F21/602G06F18/23213
Inventor 徐彦彦赵啸龚佳颖
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products