Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption
Main Article Content
Abstract
With the development of imaging devices, such as digital cameras, smartphones, and medical imaging equipment, our world has witnessed tremendous growth in the quantity, availability, and importance of images. The need for efficient image storage and retrieval services has been reinforced by the increase in large-scale image databases across various domains. However, compared to text documents, images consume much more storage space, making their maintenance a typical example for cloud storage outsourcing. For privacy-preserving purposes, sensitive images, such as medical and personal images, need to be encrypted before outsourcing, rendering the existing CBIR (Content-Based Image Retrieval) technologies in plaintext domain unusable. To address this challenge and secure the data in the cloud, the proposed system supports CBIR over encrypted images without leaking sensitive information to the cloud server. The process involves extracting feature vectors to represent the corresponding images. Subsequently, pre-filter tables are constructed using locality-sensitive hashing to enhance search efficiency. Moreover, the feature vectors are protected by the secure kNN (k-Nearest Neighbors) algorithm, while image pixels are encrypted using a standard stream cipher. In addition, the system considers the possibility of authorized query users illegally copying and distributing the retrieved images to unauthorized individuals. To address this concern, a watermark-based protocol is employed to deter such illegal distributions. In this protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before transmitting them to the query user. Consequently, if an illegal image copy is found, the unlawful query user responsible for distributing the image can be traced through watermark extraction. By employing these techniques, the proposed system ensures the privacy and security of sensitive images while enabling efficient content-based retrieval over encrypted data in cloud storage environments.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensic and Security, 11(11), November 2016.
Ferreira, B., Rodrigues, J., Leit˜ao, J., & Domingos, H. (2014). Privacy-preserving content-based image retrieval in the cloud. arXiv preprint arXiv:1411.4862.
Rial, A., Deng, M., Bianchi, T., Piva, A., & Preneel, B. (2010). A provably secure anonymous buyer–seller watermarking protocol. IEEE Transactions on Information Forensics and Security, 5(4), 920– 931.
Carson, C., Thomas, M., Belongie, S., Hellerstein, J. M., & Malik, J. (1999). Blobworld: A system for region-based image indexing and retrieval. In Proceedings of the Third International Conference on Visual Information and Information Systems, Springer-Verlag, London, UK, 509-516.
Wang, C., Ren, K., Yu, S., & Urs, K. M. R. (2012). Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings of INFOCOM. IEEE, 451–459.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt. Springer, 506–522.
Anto, S., & Chandramathi, S. (2015). An Expert System based on SVM and Hybrid GA-SA Optimization for Hepatitis Diagnosis. International Journal of Computer Engineering In Research Trends, 2(7), 437-443.
Long, F., Zhang, H. J., & Feng, D. D. (2003). Fundamentals of Content-based Image Retrieval. In Multimedia Information Retrieval and Management, D. Feng (Eds.), Springer.
Jindal, S., & Kaur, H. (2016). Intensification of Resolution in the Realm of Digital Imaging. International Journal of Computer Engineering In Research Trends, 3(6), 343-346.
Bezdek, J. C. (1981). Pattern Recognition with Fuzzy Objective Function Algorithms. New York: Plenum Press.
Ma, W., & Manjunath, B. S. (1999). NeTra: a toolbox for navigating large image databases. Multimedia Systems, 7(3), 184-198.
Salih, N. D., & Ngo, D. C. L. (2005). A novel method for shape representation. GVIP 05 Conference, 19-21 December 2005.
Ravichandran, K., & Ananthi, B. (2009). Color Skin Segmentation Using K-Means Cluster. International Journal of Computational and Applied Mathematics, 4(2), 153-157.
Rui, Y., Huang, T. S., & Mehrotra, S. (1997). Content-based image retrieval with relevance feedback in MARS. In Proceedings of International Conference on Image Processing, 2, 815-818.
Lian, S., Liu, Z., Zhen, R., & Wang, H. (2006). Commutative watermarking and encryption for media data. Optical Engineering, 45(8), 080510–080510.
Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2015). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.
Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.
Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel & Distributed Systems, PP, Online, 1–1.