Laser & Optoelectronics Progress, Volume. 56, Issue 3, 031001(2019)

A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images

Dongmei Huang1, Guojian Wu1, Lifei Wei1、*, Quanmiao Wei2, and Liang Dai1
Author Affiliations
  • 1 College of Information Technology, Shanghai Ocean University, Shanghai 201306, China
  • 2 East China Sea Branch, State Oceanic Administration, Shanghai 200136, China
  • show less
    Figures & Tables(25)
    System model for secure outsourcing search for encrypted remote sensing images
    Flow chart of uploading image by image owner
    Basic flow chart for search of encrypted remote sensing images
    Flow chart of XOR encryption of images
    Permutation table
    Flow chart of JL transformation
    Binary attack effect. (a) Original image; (b) encrypted image; (c) binary attack result
    Basic scan modes
    Mode division and transformation
    Path schematic for scanning of key B5(s2 Z0(c5 b0 o0 s5) c4 d1)
    Search results of remote sensing images. (a) Image O; (b) image with different phases; (c) remote sensing image with Gaussian noise; (d) remote sensing image under dimmed light; (e) remote sensing image with deformation; (f) remote sensing image of island; (g) remote sensing image of land
    Comparison of precision rates
    Comparison of recall rates
    Comparison of search time
    Binary attack effect. (a) Basic scheme; (b) improved scheme
    Correlation among adjacent pixels in original image
    Correlation among adjacent pixels in encrypted image
    • Table 1. Algorithm 1 of encryption algorithm for remote sensing images

      View table

      Table 1. Algorithm 1 of encryption algorithm for remote sensing images

      InputSplit an index remote sensing image band into a single-band image Y(i,j);Height and width of remote sensing image are H and W;Randomly generate a matrix Q of Gaussian distribution h2×k obeying an average of 0 and a variance of 1/k;Randomly generate a matrix R of H×W;Randomly generate a matrix Δ of h2×k;
      OuputXOR encrypted remote sensing image EA;JL transformation encrypted remote sensing image EB;Double ciphertext EB={EA,EB}
      Algorithmicprocess1. for image Y i=1 to H {2. for image Y j=1 to W {3. EA(i,j)=Y(i,j)⊕R(i,j)4. }5. }6. for image Y i=1 to h2{7. for image Y j=1 to h2{8. for matrix Q m=1 to h2{9. for matrix Q n=1 to k {10. EB(m,n)=Y(i,jQ(m,n)+Δ(m,n)11. }12. }13. }14. }15. return upload index EI={EA,EB}
    • Table 2. Algorithm 2 of algorithm for calculation of Euclidean distance between remote sensing images

      View table

      Table 2. Algorithm 2 of algorithm for calculation of Euclidean distance between remote sensing images

      InputHeight and width of remote sensing image EB by JL transformation are H and W; Remote sensing image S stored in cloud platform;
      OuputDistance of two remote sensing images is d;
      Algorithmicprocess1. for image EB i=1 to H {2. for image EB j=1 to W {3. sum+=(EB(i,j)-S(i,j))24. }5. }6. d=sum-2×k×ξ2h27. return distance d
    • Table 3. Optimal threshold analysis

      View table

      Table 3. Optimal threshold analysis

      (T1,T2)Actual number ofsimilar imagesNumber ofimages searchedNumber ofcorrect imagesNumber oferror imagesNumber of imagesnot searched
      (0.7,0.8)5600056
      (0.8,0.9)5600056
      (0.9,1.0)5644052
      (1.0,1.1)561212044
      (1.1,1.2)5652322024
      (1.2,1.3)565605656
      (0.8,1.0)5644052
      (0.9,1.1)562020036
      (1.0,1.2)5664442012
      (0.8,1.1)562020036
      (0.9,1.2)567252204
    • Table 4. Parameter value

      View table

      Table 4. Parameter value

      ParameterInstructionsValue
      HHeight of remote sensing image512
      WWidth of remote sensing image512
      NBand number of remote sensing image200
      hHeight of JL transformation5
      kVariance parameter ofGaussian distribution Q18
      sVariance parameter ofGaussian distribution Δ0.5
      TThreshold550
    • Table 5. Precision rate

      View table

      Table 5. Precision rate

      Scheme categoryNumber of images
      50100150200250300350400
      Lowe's scheme [25]0.1350.2290.3780.4460.5680.6080.6760.729
      Basic scheme0.0590.1010.1660.1960.250.2680.3040.333
      Improved scheme0.1390.2220.3750.4310.5560.5970.6670.722
    • Table 6. Recall rate

      View table

      Table 6. Recall rate

      Scheme categoryNumber of images
      50100150200250300350400
      Lowe's scheme [25]0.1790.3040.5000.5890.7500.8040.8930.964
      Basic scheme0.1790.3040.5000.5890.7500.8040.9111
      Improved scheme0.1790.2860.4820.5540.7140.7680.8570.929
    • Table 7. Adjacent pixel point data in original and encrypted images

      View table

      Table 7. Adjacent pixel point data in original and encrypted images

      Original imagePixel value of point(x, y)156139143138139147153156157146
      Pixel value of point (x+1, y)77577156484961788191
      Encrypted imagePixel value of point(x,y)156139143138139147153156151156
      Pixel value of point (x+1, y)3311119634711424883732
    • Table 8. Analysis of related schemes for ciphertext search

      View table

      Table 8. Analysis of related schemes for ciphertext search

      Ciphertextsearch schemeSuitable forcloud computingSupport imagesearchSecurityAccuracySearchefficiency
      Ref. [26]YesFalseLowLowLow
      Ref. [27]FalseFalseHighHighLow
      Ref. [28]FalseYesLowHighLow
      Ref. [13]YesYesHigherHighHigher
      Proposed schemeYesYesHighHighHigh
    Tools

    Get Citation

    Copy Citation Text

    Dongmei Huang, Guojian Wu, Lifei Wei, Quanmiao Wei, Liang Dai. A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Jun. 5, 2018

    Accepted: Aug. 11, 2018

    Published Online: Jul. 31, 2019

    The Author Email: Lifei Wei (Lfwei@shou.edu.cn)

    DOI:10.3788/LOP56.031001

    Topics