This paper is published in Volume-5, Issue-2, 2019
Area
Computer Science
Author
M. Meena
Co-authors
C. S. Kavya, K. Balaji, M. Kishore, P. Suman Kumar
Org/Univ
Mother Theresa Institute of Engineering and Technology, Chittoor, Andhra Pradesh, India
Pub. Date
26 March, 2019
Paper ID
V5I2-1405
Publisher
Keywords
Cloud Computing, Searchable Encryption, Image Retrieval, Local Search, Earth Movers Distance

Citationsacebook

IEEE
M. Meena, C. S. Kavya, K. Balaji, M. Kishore, P. Suman Kumar. Towards privacy preserving content based image retrieval in cloud computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
M. Meena, C. S. Kavya, K. Balaji, M. Kishore, P. Suman Kumar (2019). Towards privacy preserving content based image retrieval in cloud computing. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.

MLA
M. Meena, C. S. Kavya, K. Balaji, M. Kishore, P. Suman Kumar. "Towards privacy preserving content based image retrieval in cloud computing." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.

Abstract

Content-Based Image Retrieval applications have been rapidly developed along with the increase in the quantity availability and importance of images in our daily life. However, the wide deployment of Content-Based Image Retrieval scheme has been limited by its the server computation and storage requirement. Privacy-Preserving Content-Based Image Retrieval scheme, which allows the data owner to outsource the image database and Content-Based Image Retrieval service to the cloud, without revealing the actual content of the database to the cloud server. Local features are utilized to represent the images, and Earth Mover's Distance is employed to evaluate the similarity of images. The proposed scheme transforms the Earth Mover's Distance problem in such a way that the cloud server can solve it without learning sensitive information. The security analysis and experiments show the security an efficiency of the proposed scheme using a Secure Hash Algorithm.
Paper PDF