999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

2021-12-14 06:03:46ShiqiWangMingfangJiangJiaohuaQinHengfuYangandZhichenGao
Computers Materials&Continua 2021年9期

Shiqi Wang,Mingfang Jiang,Jiaohua Qin,Hengfu Yang and Zhichen Gao

1College of Computer Science and Information Technology,Central South University of Forestry and Technology,Changsha,410004,China

2Department of Information Science and Engineering,Hunan First Normal University,Changsha,410205,China

3Department of Applied Mathematics and Statistics,College of Engineering and Applied Sciences,Stony Brook University,NY,11794,USA

Abstract:In the era of big data,outsourcing massive data to a remote cloud server is a promising approach.Outsourcing storage and computation services can reduce storage costs and computational burdens.However,public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users.Privacy-preserving feature extraction techniques are an effective solution to this issue.Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields,we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper(called PPRILBP).To protect image content,original images are encrypted using block scrambling,pixel circular shift,and pixel diffusion when uploaded to the cloud server.It is proved that RILBP features remain unchanged before and after encryption.Moreover,the server can directly extract RILBP features from encrypted images.Analyses and experiments confirm that the proposed scheme is secure and effective,and outperforms previous secure LBP feature computing methods.

Keywords:Privacy-preserving;rotation invariant local binary pattern;cloud computing;image encryption

1 Introduction

With the rapid development of new information techniques such as big data,cloud computing,and the Internet of Things,users and companies are more willing to store their massive multimedia data on remote cloud servers.Cloud storage services have many advantages,including accessibility,convenience,and low storage expenditure,but massive multimedia data in the cloud servers contain some personal sensitive information needing to be protected.With the popularity of data outsourcing services,there is an increasing need for data security [1,2]and privacy protection in cloud computing.Privacy-preserving outsourcing protocol provides an effective way to cope with this problem [3].

So far,many privacy-preserving data outsourcing schemes have been developed.Previous privacy-preserving outsourcing works mainly focus on text documents.Song et al.[4]proposed practical cryptographic schemes supporting search on encrypted data by employing Boolean operators and phrase searches.Brinkman et al.[5]presented an efficient search method over encrypted data using secure multi-party computation in which XML elements are translated to polynomials.It prevented the server from revealing private content about the data or the query by splitting each polynomial into two parts.Boneh et al.[6]constructed a public key encryption mechanism that enables keyword search over encrypted email.User Alice provided a key to the gateway and tested whether the query word is a keyword in the email without revealing anything information about the email.Swaminathan et al.[7]designed a rank-ordered search framework over encrypted text documents.The scheme can return documents in the order of their relevance to the query term.Elmehdwi et al.proposed a secure k-nearest neighbor (kNN) protocol [8].The secure kNN search scheme supports the kNN query,while the confidentiality of the data,the user’s input query,and data access patterns.Analysis results indicate that the presented retrieval protocol on encrypted data is secure and efficient.However,common cloud servers in practice may be owned by multiple users rather than only one user.In [9],a privacy-preserving ranked multi-keyword search of encrypted data suitable for the multi-owner model was introduced.Recently,the study on privacy-preserving data outsourcing services has been drawn to multimedia data [10-14].The Scale-Invariant Feature Transform (SIFT) is a popular method in the field of image processing.It is widely used in computer vision such as object recognition and tracking,and image matching.Hsu et al.[15]first proposed a privacy-preserving SIFT feature representation and extraction approach using the Paillier cryptosystem.It enables us to perform feature extraction in the encrypted domain.Hu et al.[16]focused on privacy-preserving computation outsourcing protocol for SIFT feature over massive encrypted image data and presented a secure SIFT feature extraction scheme.it achieved efficiency and security requirements simultaneously by preserving its key characteristics and designed two protocols for secure multiplication and comparison by randomly splitting original image data.To achieve good efficiency and security,Jiang et al.[17]proposed an effective privacy-preserving SIFT scheme for encrypted images.It devised leveled homomorphic encryption using a new encoding method,homomorphic comparison,division,and derivative encryption.Wang et al.[18]aimed at Speeded-up Robust Features (SURF) and proposed a privacy-preserving SURF computation scheme.it can preserve the distinctiveness and robustness of SURFs while enabling secure multiplication and comparison by leveraging somewhat homomorphic encryption (SHE) and single-instruction multiple-data (SIMD).Jiang et al.[19]first proposed a secure searchable image encryption algorithm for Block Truncation Coding (BTC)compressed images by encrypting the bit plane and two quantization levels of each subblock using the Henon chaotic map.Features based on BTC can be directly computed from encrypted images.Qin et al.[20]proposed a secure Harris feature extraction method for encrypted image retrieval that uses the improved Harris method,SURF,and the Bag of Words model to form the feature vectors.A privacy-preserving BTC feature extraction (PPBTC) is reported in [21].First,all images are uploaded to the cloud after encryption.The privacy-preserving image encryption process consists of block permutation,pixel diffusion,and a bit-plane random shift.BTC features remain unchanged after encryption and the cloud server can directly extract BTC features from the encrypted images.Some analyses and experimental results demonstrate that the proposed privacy-preserving feature extraction scheme for BTC-compressed images is efficient and secure,and it can be used to secure image computation applications in cloud computing.A local sensitive hash algorithm was employed to produce the searchable index because of the wide application of image hash [22]in image retrieval.The chaotic encryption approach was used to protect the security of images and indexes.Sultana et al.[23]proposed privacy-preserving Local Binary Patterns computation outsourcing scheme that can extract LBP features from encrypted images,in which image encryption was applied only on the MSB (Most Significant Bit) plane of an image.All operations were performed on encrypted images without revealing any information to cloud servers.However,its image scrambling degree is not good.Aiming at secure online data storage services in the Industrial Internet of Things (IIoT),Xia et al.[24]proposed a secure image LBP feature computation scheme.It can directly extract LBP based features from the encrypted images without revealing the private content in the images.

Rotation invariant LBP (RILBP) is an excellent operator and has been widely applied in texture description.Privacy-preserving RILBP feature computation will gain wide application in secure cloud computing.To achieve direct RILBP-based feature representation and computation in the encrypted domain and preserve the privacy of images stored in remote servers,we proposed a privacy-preserving RILBP (PPRILBP) features computation outsourcing scheme in this paper.

The main contributions of this paper are as follows.

(1) This paper proposed a novel secure feature computation algorithm by combining block scrambling,pixel circular shift,and pixel diffusion.Since the feature extraction does not need to decrypt the encrypted data,the new encryption strategy enables direct calculation of RILBP features from encrypted images without revealing private information in images.

(2) The correctness of RILBP feature extraction in the encrypted domain has been proved.Meanwhile,only one server is needed for direct feature computation from encrypted images.Our PPRILBP scheme can find good applications in privacy-preserving image retrieval in cloud environment.

(3) Compared with existing secure LBP feature computation schemes,the new PPRILBP scheme has shown better robustness against common signal processing manipulations,including slight geometric attacks.It can achieve better retrieval accuracy.

The remainder of this paper is organized as follows.In Section 2,a rotation invariant local binary pattern is briefly introduced.Section 3 describes the proposed PPRILBP algorithm in detail.The experiment results and analyses are given in Section 4.Section 5 analyzes the correctness of feature extraction.Finally,the conclusion is made in Section 6.

2 Rotation Invariant Local Binary Pattern

The Local Binary Pattern (LBP) technique was first introduced by Ojala et al.[25].As a well-defined texture descriptor,it has been widely used in various image processing fields such as image retrieval,image recognition,and image authentication.The original LBP operator assigns pixel value differences of each pixel with its 3×3 neighboring pixels as a binary number.The neighbor is marked as ‘1’if the corresponding pixel value is greater than the center pixel value and 0 otherwise.

The circular LBP is an extension of the basic LBP operator.It can deal with the texture description of different sizes.Let the notation(P,R)denote the neighbor set withPsampling points on a circle of radiusR.The pixel values are bilinearly interpolated when the sampling point does not fall at integer coordinates.Given the center pixel(xc,yc)with pixel valueIc,the LBP number for the center pixel is calculated as follows.

whereIpis the pixel value of the neighbor pixelands(x)is the sign function.

To remove the effect of rotation,the LBP operator is further extended to the so-called rotation invariant LBP operator,denoted as.whereROR(x,i)performs a right circulari-bit shift on each bit pattern and the function min(z)returns the minimum value of the arrayz.

For example,the linear permutation 111100002,11100012,and 110000112are different rotation versions of the same local pattern,and they all correspond to the same circular permutation with a minimum value 000011112.LetP=8 andR=1,Fig.1 shows an example of the RILBP operator with a circular neighbor set(8,1)

Figure 1:The RILBP operator with a circular neighbor set (8,1)

3 Proposed PPRILBP Scheme

In this section,the proposed secure outsourcing scheme for RILBP features is described in detail.All images will be encrypted using block scrambling,pixel circular shift,and pixel diffusion before uploaded into the remote server.The cloud server can directly compute the RILBP based features from encrypted images without decrypting them.The block diagram of the proposed method is illustrated in Fig.2.

Figure 2:The block diagram of the proposed PPRILBP scheme

3.1 Image Encryption

In the image encryption phase,the original image is divided into 3 × 3 nonoverlapping blocks.Each subblock will undergo three processes:block scrambling,pixel circular shift,and pixel diffusion.

The secret keykey1is used to produce pseudo-random permutations from the interval[0,1,...,Nb-1]during block scrambling,whereNbis the number of nonoverlapped blocks.

Then use secret keykey2to generate a pseudo-random sequencensfor performing pixel shift on the neighbor pixels sequenceN eb.The pixel shift operation does not change the RILBP feature since the minimum of the LBP feature remains unchanged before and after pixel circular shifting.Finally,secret keykey3is used to generate random sequences for performing pixel diffusion onto a circular shifted neighbor sequenceN ecto further remove the correlation of the adjacent pixel.In order not to change the sign of the difference between the center pixel and the neighbor pixels,we adopt the following strategy,

whereN edis the sequence of diffused neighbor pixels,xcis the center pixel,Inb1 and Inb2are the pseudo-random sequence less thanxcand greater than or equal toxc,respectively.

The detailed steps for image encryption are described in Algorithm 1.

Algorithm 1:Image encryption Input:original image F with size m×n,secret key key1,key2 and key3 Output:encrypted image E Initialization:block size Bs=3,P=8 1:Use key1 to generate a pseudo-random permutation Pb within the interval [0,1,...,Nb-1].2:for i=0: Nb-1 3: block′(Pb(i))←block(i)4:Denote neighbor set as N eb

(Continued)

5:Denote the center pixel as xc.6:Use key2 to generate a pseudo-random number ns within [0,1,...,Bs×Bs-1].7:Perform the right circular ns-pixel shift on the neighbor sequence N eb and generate N ec.8:Use key3 to generate pseudo-random permutations Inb1 within the interval[0,1,...,xc-1]and Inb2 within interval [xc,xc+1,...,255].9:for k=0:P-1 10:Update the neighbor pixels N ec using Eq.(6) and produce N ed.11:end for 12:end for

The encrypted imageEis produced when all image blocks are processed.

Image decryptionis the inverse process of the encryption process.Given the same secret keys and image block size,users can recover the original images from encrypted images.

3.2 RILBP Feature Extraction From Encrypted Image

The proposed image encryption does not change the RILBP features of each block.The RILBP features can be directly computed in the encrypted domain without decryption.The main procedures of secure feature extraction are shown in Fig.2,and a more detailed description of the proposed RILBP feature extraction method is illustrated in Algorithm 2.

Algorithm 2:RILBP feature extraction Input:encrypted image E with size m×n Output:RILBP histogram feature F Initialization:block size Bs=3,P=8 1:Divide the image E into nonoverlapped blocks.2:for i=0:Nb-1 3:Compute RILBP feature F(i) for the ith block using Eq.(4).4:end for 5:Compute the RILBP histogram feature F.

4 The Correctness of RILBP Histogram Features Extraction

Definition 1(Identical),two sequences are identical if and only if they contain the same elements in the same order.For example,these two sequences(5,6,23,9,3)and(5,6,23,9,3)should be considered identical.

Definition 2(Equivalent),two sequences are equivalent if and only if they are different permutations of all elements from the same set,where ordering does not matter.For instance,these two sequences(3,5,6,9,23)and(5,6,23,9,3)should be considered equivalent.

We consider the original image signal sequenceF.The signal is subdivided into blocks with a size ofBs.LetBibe a subblock of the original image,i.e.,We denote S as the block scrambling transform,

whereF′is the scrambled image,

Hence,we have

Theorem 1.The sequenceFand corresponding scrambled sequenceF′are equivalent,denoted asF~=F′.

Proof.Since the block scrambling transforms S only changes the position of an image subblock,the two sequencesFandF′contain the same image subblock except that only ordering of the subblock in the sequences is different.Therefore,the two sequencesFandF′are equivalent according to Definition 2.

For any subblockB′∈F′,the center pixelxcand the neighbor sequenceN ebare got at first.The definition of the circular pixel shift operator C is as follows.

Definition 3.The circular pixel shift operator C(N eb,x)performs right circularx-pixel shift on the neighbor sequenceN eband produces a new sequenceN ec,

The sequenceN eband its circular shifted sequenceN ecare rotation invariant,denoted as

Denote the pixel diffusion strategy as D,according to Eq.(6),we have

Besides,then the following lemma can be concluded.

Lemma 1.Pixel diffusion strategy D does not change the sign of the difference between the center pixel and the neighboring pixels,i.e.,sign(N ec-xc)=sign(N ed-xc).

Proof.

?k∈{0,1,...,P-1}

if N ec(k)-xc≥0

N ed(k)-xc=Inb2(N ec(k)-xc+1)-xc

∵Inb2(N ec(k)-xc+1)≥xc

∴N ed(k)-xc≥xc-xc=0

else

N ed(k)-xc=Inb1(N ec(k)+1)-xc

∵Inb1(N ec(k)+1)<xc

∴N ed(k)-xc<xc-xc=0

Therefore,the sign of the difference between the center pixel and the neighbor pixels remains unchanged before and after pixel diffusion,i.e.,sign(N ec-xc)=sign(N ed-xc).

LetB′c,B′dbe the circularly shifted subblock and the pixel diffused subblock of any subblockB′,respectively.LetLBP(·),RILBP(·)be the LBP and RILBP operators,respectively.LetEbe the encrypted image signal sequence.Then,we have

Theorem 2.RILBP=RILBP(E).

Proof.?B′∈F′,?B′d∈E,

N eb,N ec,N edare neighbor sequences derived from subblocksB′,B′c,B′d,respectively.

According to Lemma 1,we havesign(N ec-xc)=sign(N ed-xc).

Thus,RILBP=RILBP(E)sinceB′,B′dare any subblocks of sequencesF′,E,respectively.

Finally,the following theorem be proved

Theorem 3.The histogram of RILBP features computed from the original image and encrypted images are the same,

Proof.

We haveF~=F′according to Theorem 1.

So,RILBP(F)~=RILBP

Also,becauseRILBP=RILBP(E)according to Theorem 2.

We haveRILBP(F)~=RILBP(E).

Since the histogram feature does not consider the ordering of elements,we can conclude that the same RILBP histogram features can be computed from the original image and encrypted image,respectively.

5 Experimental Results and Analyses

The section provides some analyses and experiments to validate the security and effectiveness of the proposed PPRILBP outsourcing algorithm.The algorithm is conducted on the USC-SIPI Image Database.Fig.3 shows some test images from the image dataset.In the experiments,we setP=8 andR=1.The generated encrypted images by our PPRILBP algorithm are illustrated in Fig.4.According to Fig.4,one cannot observe useful information from the encrypted image by human eyes.

Figure 3:Original images (a) Lena (b) peppers (c) Goldhill (d) couple

Figure 4:Encrypted images (a) Lena (b) peppers (c) Goldhill (d) couple

5.1 Security Analysis

In this section,the key space size is first investigated,which is the total number of different keys used in the encryption process.In the proposed PPRILBP algorithm,the secret key consists of three secret keys (key1,key2,andkey3).If each secret key has a precision of 10-15then there will be 15+15+15=45 uncertain digits of the secret key combination.This means that the complete key space for the proposed secure feature extraction reaches up to 1045,i.e.,our PPRILBP algorithm possesses an effective key length of log2≈150 bits.The key space of our algorithm is larger than that of the 128-bit encryption.Therefore,we can say that the proposed PPRILBP algorithm has a large enough key space and can resist all kinds of bruteforce attacks.

Besides,a good image encryption scheme should be sensitive to the secret keys.In our scheme,the sensitivity tokey1,key2,andkey3is considered as 10-15.To test the key sensitivity,the original image (taking the Lena image as an example) is first encrypted using secret keys(key1=0.74,key2=0.79,key3=0.13),and the resultant encrypted mage is shown in Fig.5a.Fig.5b is the decrypted Lena image using the correct key,and Figs.5c-5e are the decrypted images using the wrong key,respectively.From Fig.5,we can find that even a secret key set with a tiny change (10-15) does not reveal any information on the plain-image.Therefore,the proposed scheme has a high key sensitivity.

Figure 5:Key sensitivity test.(a) Encrypted image using key (key1=0.74,key2=0.79,key3=0.13).(b) Decrypted image using key (key1=0.74,key2=0.79,key3=0.13).(c) Decrypted image using key (key1=0.74+10-15,key2=0.79,key3=0.13).(d) Decrypted image using key (key1=0.74,key2=0.79+10-15,key3=0.13).(e) Decrypted image using key (key1=0.74,key2=0.79,key3=0.13+10-15)

5.2 Adjacent Pixels Correlation Analysis

An efficient image encryption system should generate encrypted images with low correlation in the adjacent pixels.The distribution of the adjacent pixels in the original image and its corresponding encrypted image provide an effective visual measure way of the correlation of adjacent pixels.Fig.6 shows the correlation distribution of two horizontally adjacent pixels of the original image and encrypted image generated by our proposed scheme.The left column and the right column are the correlation distribution of the original image and its corresponding encrypted image,respectively.We can see that the correlation between adjacent pixels in the encrypted image is diffused effectively.The encrypted images produced by our proposed scheme have a weaker correlation than their original images.Thus,the new image encryption algorithm can almost eliminate the correlation of pixels.

Figure 6:Correlation of two horizontally adjacent pixels.Left column:original images,right column:encrypted images (a) Lena (b) peppers

5.3 Direct PPRILBP Feature Extraction on Encrypted Data

We extract the features from original images and encrypted images for evaluating the accessibility of feature computation.The extracted RILBP features are shown in Fig.7.The features from the original image and encrypted image are illustrated in the left column and the right column,respectively.It is not hard to notice that the image encryption scheme extracts the same PPRILBP features from the original image and encrypted images.So,the proposed PPRILBP scheme can achieve a high successful retrieval rate when used to image retrieval in cloud computing.

Figure 7:RILBP feature extraction before and after image encryption.Left column:features extracted from original images,right column:features extracted from encrypted images.(a) Lena(b) peppers

Moreover,we further calculate the similarities between different images for homomorphic evaluation.Pearson’s correlation coefficient is employed to evaluate feature similarity,whereE(X)denotes the mathematical expectation.

The corresponding test results are listed in Tabs.1 and 2,respectively.It can be found that feature similarity remains unchanged before and after encryption by observing Tabs.1 and 2.This indicates that the feature vector extracted by our PPRILBP scheme is homomorphic.

Table 1:Similarities of different original images in Fig.3

Table 2:Similarities of different encrypted images in Fig.4

5.4 Case Study on Privacy-Preserving Image Retrieval

As an excellent texture descriptor,LBP has been successfully employed for feature extraction in image retrieval due to its high discriminating ability.In experiments.We apply the proposed PPRIBP algorithm and Xia et al.[24]scheme to search images under the USC-SIPI Image Database.General evaluation metrics recall and precision is employed to evaluate image matching.Fig.8 shows the performance of the proposed method and Xia et al.[24]scheme.From Fig.8,we can notice that the performance of the proposed PPRILBP method is better than that by existing work when recall is not more than 0.5.Since that the higher precision with low recall is of more practical significance for image retrieval application,it can be concluded that our PPRILBP outperforms the existing secure LBP feature extraction scheme [24].

Figure 8:Precision-recall curves of different retrieval methods

6 Conclusion

Rotation Invariant Local Binary Pattern is a popular texture descriptor in computer vision applications.We propose a secure outsourcing scheme of RILBP feature computation.The image encryption using block scrambling,pixel circular shift,and pixel diffusion does not change the RILBP feature of each block.So,the same features can be computed from both the original images and encrypted images.Its security and performance are analyzed and evaluated.Experiments and analysis show that our scheme can directly extract features from encrypted data while preserving privacy and has better retrieval performance than the existing privacy-preserving LBP feature extraction method.

Funding Statement:This work was supported in part by the National Natural Science Foundation of China under Grant No.61872408,the Natural Science Foundation of Hunan Province(2020JJ4238),the Social Science Fund of Hunan Province under Grant No.16YBA102,and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No.2015TP1017.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 午夜日b视频| 精品无码视频在线观看| 国产丝袜一区二区三区视频免下载| 亚洲一区免费看| 日韩a在线观看免费观看| 四虎免费视频网站| 亚洲国模精品一区| 农村乱人伦一区二区| 99免费视频观看| 麻豆精品在线播放| 在线视频97| 色综合日本| 在线免费a视频| 最新国产网站| 99在线观看视频免费| 成人一级黄色毛片| 国产精品久久自在自2021| 成人福利在线看| 99九九成人免费视频精品| 久久综合亚洲色一区二区三区| 亚洲第一页在线观看| 亚洲欧美日韩成人在线| 国产精品网址在线观看你懂的| 婷婷综合缴情亚洲五月伊| 中文字幕 欧美日韩| 国产精品va| 女人av社区男人的天堂| 精品少妇人妻无码久久| 最新加勒比隔壁人妻| 91色在线观看| 日本成人福利视频| 久久久久九九精品影院| 先锋资源久久| 精品视频第一页| 欧美另类视频一区二区三区| 欧美亚洲一二三区 | 99er这里只有精品| 97在线公开视频| 日本午夜影院| 四虎精品国产AV二区| 欧美激情综合| 中文一区二区视频| 国产无码制服丝袜| 亚洲AV电影不卡在线观看| 久久人人97超碰人人澡爱香蕉| 91精品福利自产拍在线观看| 婷婷六月激情综合一区| 国产在线啪| 精品少妇人妻av无码久久| 91久久国产综合精品女同我| 久久福利网| 国产精品手机在线播放| 夜夜操狠狠操| 天天干天天色综合网| 丝袜美女被出水视频一区| 亚洲av无码牛牛影视在线二区| 最近最新中文字幕在线第一页| 无码AV日韩一二三区| 久久综合五月| 国产毛片高清一级国语 | 亚洲美女一级毛片| 五月婷婷综合在线视频| 亚洲Av激情网五月天| 成年A级毛片| 日韩成人在线一区二区| 国产福利观看| 欧洲熟妇精品视频| 亚洲成人精品久久| 亚洲综合色吧| 国产精品视频观看裸模| 国产成人综合日韩精品无码首页| 中文字幕1区2区| 免费 国产 无码久久久| 91久久青青草原精品国产| 永久免费AⅤ无码网站在线观看| 久久国语对白| 999精品视频在线| 国产激情国语对白普通话| 成人精品在线观看| 精品少妇人妻无码久久| 91美女视频在线| 欧美亚洲第一页|