• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    2019-02-22 07:32:38ZhihuaXiaLihuaLuTongQiuShimXianyiChenandByeungwooJeon
    Computers Materials&Continua 2019年1期

    Zhihua Xia , Lihua Lu Tong Qiu H. J. Shim Xianyi Chen and Byeungwoo Jeon

    Abstract: Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem,so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this scheme, the discrete cosine transform (DCT) is performed on the Y component. The resulting DC coefficients are encrypted with stream cipher technology and the resulting AC coefficients as well as other two color components are encrypted with value permutation and position scrambling. Then the image owner transmits the encrypted images to the cloud server. When receiving a query trapdoor form on query user, the server extracts AC-coefficients histogram from the encrypted Y component and extracts two color histograms from the other two color components. The similarity between query trapdoor and database image is measured by calculating the Manhattan distance of their respective histograms. Finally, the encrypted images closest to the query image are returned to the query user.

    Keywords: Image retrieval, AC-coefficients histogram, color histogram, discrete cosine transform.

    1 Introduction

    With the rapid development of digital devices, a large number of images are generated and shared. Image data contain rich information and they have been explored in many fields, such as feature extraction [Hu, Wang, Wang et al. (2016)], information hiding[Cao, Zhou, Sun et al. (2018)] and image retrieval [Zhang, Liu, Dundar et al. (2015);Cavallaro, Lagendijk, Erkin et al. (2017)]. Searching an intended image from a huge dataset has raised increasing attention, and many advanced retrieval technologies have been proposed [Liu, Shen, Xia et al. (2007); Akgü l, Rubin, Napel et al. (2011);Abdulsada, li, Abdulabbat et al. (2013); Xia, Zhu, Sun et al. (2015)]. Nevertheless, huge storage space and complex computation requirements are needed to search one particular image from a large amount of images, which is almost impossible for users with lightweight devices (e.g. smart phones), so outsourcing image data to the cloud storage providers becomes one of the most convenient options because they provides enormous storage space and powerful computing ability.

    However, outsourcing the image data with sensitive information (such as financial position, personal identification and healthy records) to the server often results in great challenges in terms of data control and privacy. To prevent unauthorized access, the image owners usually encrypt their image data before its transmission to the server, but the conventional encryption operations pose a threat to image retrieval. For effectively utilizing and managing image resources, the researchers have made great efforts and they have proposed many practical retrieval schemes in this field [Reynolds (2016); Parikesit(2017); Cui, Zhang, Cai et al. (2018); Cai, Wang, Zheng et al. (2013)]. In original scenarios [Rui, Huang, Ortega et al. (1998); Xia, Xiong, Vasilakos et al. (2017); Weng,Amsaled and Furon (2016); Xia, Wang, Zhang et al. (2017)], the image owners not only complete the task of index construction and encryption, but transmit the encrypted index to the server as well. Once receiving the query trapdoors, the server retrieves the intended images and returns them to the query users. These schemes provides feasible solutions and realize secure image retrieval in the encrypted domain, but the computation burden of index generation and encryption in the image client is really too heavy. To reduce the workload of image client and effectively implement retrieval work, some content-based image retrieval (CBIR) schemes have been put forward [Cheng, Wang, Wang et al.(2017); Xia, Xiong, Vasilakos et al. (2017); Cheng, Zhang, Yu et al. (2016)]. In this paper, we propose a secure retrieval scheme for encrypted images based on the combination of AC-coefficients and color histograms. The main contributions are as follows:

    (1) In our scheme, the image owner only needs to encrypt the database images. The index construction and image retrieval work will be done by the cloud server.

    (2) We propose to use the combination of AC-coefficients and color histograms for image retrieval in the encrypted domain. The search result shows that the combination of AC-coefficients and color histograms achieves better retrieval accuracy than either of them alone in the YUV color space.

    The rest of our paper is organized as follows. In Section 2, we briefly review the methods of image encryption and index generation in previous woks. In Section 3, we introduce the design of our system model and security model. In Section 4, we describe the process of image encryption and index generation in proposed scheme. The Section 5 and Section 6 show the security analysis and retrieval performance respectively. In the final section,we draw a conclusion.

    2 Related works

    Previous searchable encryption schemes have more concentrated on retrieving text documents in the encrypted domain [Wang, Cao, Ren et al. (2012); Fu, Huang, Ren et al.(2017)], where a data owner outsources text document to its server and is able to retrieve desired document with keyword search. Song et al. [Song, Wagner and Perrig (2000)]proposed the first retrieval scheme in data encryption, where the encryption and retrieval work is performed on a word-by-word basis, but this scheme is not efficient enough because of no-index mechanism. To improve efficiency, Curtmola et al. [Curtmola,Garay, Kamara et al. (2006)] constructed a secure reversed index for the encrypted text documents, where the computing cost is proportional to the amount of documents. They presented two encryption schemes, the first scheme is secure for the selective key attack,and the other scheme is secure for the dynamic selective key attack. Afterwards, the researchers improved the functions of encrypted algorithms for designing practical schemes, such as supporting fuzzy keyword search [Fu, Wu, Guan et al. (2017)], multikeyword sorted search [Fu, Sun, Linge et al. (2014)] and dynamic search [Xia, Wang,Sun et al. (2016)].

    An exploring work of image retrieval in the encrypted domain has attracted much attention, which aims at executing retrieval work on the server while ensuring images to be handled secretly. Lu et al. [Lu, Swaminathan, Varna et al. (2009)] proposed the solutions to realize image retrieval in the encrypted domain for the first time. They introduced two secure indexing schemes, in which the information of word frequency distribution is protected by order preserving encryption and Min-hash. In another work[Lu, Varna, Swaminathan et al. (2009)], they employed signal processing and cryptographic techniques to achieve secure distance calculation without divulging image content. They have compared three encryption algorithms, including plane randomization,random projection and randomized unary encoding. Their experimental results show that the first two algorithms support the ordered computation of Hamming distance and the third algorithm supports the approximate computation of L1 distance. Lu et al. [Lu,Varna and Wu (2014)] compared the homomorphic encryption with the proposed encryption scheme of work [Lu, Varna, Swaminathan et al. (2009)] in terms of retrieval accuracy, retrieval efficiency and storage overhead. The experimental results show that the homomorphic encryption is not advantageous in these aspects. In Abdulsada et al.[Abdulsada, Ali, Abdulabbat et al. (2013); Yuan, Wang, Wang et al. (2014); Yuan, Yu and Guo (2015)], tree index and local sensitive hashing (LSH) method are used to reduce retrieval time. In Abdulsada et al. [Abdulsada, Ali, Hashim et al. (2013)], Abdulsada et al.established a searchable index by using LSH method. Images are protected by using the advanced encryption standard (AES) encryption method and image feature is protected by a reversible matrix. In order to improve the retrieval efficiency further, Yuan et al.[Yuan, Wang, Wang et al. (2014)] proposed to combine LSH and Cuckoo hash to get faster and more efficient similarity search. Image features are extracted by using the Bagof-words (BOW) model to generate visual word vectors. The image is protected by the encryption method based on attribute encryption, and its hash value is protected by a oneway function. In Yuan et al. [Yuan, Yu and Guo (2015)], secure k-nearest neighbors(kNN) algorithm is used to realize secure image retrieval and a tree index is constructed to improve search efficiency. In addition, Xia et al. [Xia, Zhu, Sun et al. (2013)] proposed a secure image retrieval scheme which uses invertible matrix to protect image feature vectors and achieves the order preserving calculation of Euclidean distance. Abduljabbar et al. [Abduljabbar, Jin, Ibrahim et al. (2017)] extracted local speeded up robust features(SURF) to represent image feature and AES technology is used to protect images in the database. The similarity between query image and database image is measured by calculating the Euclidean distance of their responding feature vectors.

    Although the previous outsourced CBIR schemes solve the privacy problem, the computational workload on user is still heavy, since it is image owner’s task to deal with feature extraction and index generation that require numerous resources. Moreover, a large amount of computing resources and the problem of cipher expansion make homomorphic encryption impractical [Bellafqira, Coatrieux, Bouslimi et al. (2015);Zhang, Jung, Liu et al. (2017)]. A lot of work has been proposed to solve above problems.Cheng et al. [Cheng, Zhang, Yu et al. (2016)] introduced an encrypted JPEG image retrieval scheme using block feature comparison. AC-coefficient histogram in a block is used to form a local feature descriptor, and AC coefficients as well as DC coefficients are encrypted with permutation encryption and stream encryption respectively. The similarity between query image and database image is measured by comparing the distance of their corresponding local features. Cheng et al. [Cheng, Zhang, Yu et al. (2015)] proposed a retrieval scheme based on Markov process. The scheme uses stream cipher to encrypt coded data, and extracts Markov features from the encrypted data directly. The similarity between query image and database image is measured by calculating the distance of their corresponding Markov features. Bernardo et al. [Ferreira, Rodrigues, Leitao et al. (2017)]proposed an encrypted content-based image retrieval scheme. In this scheme, color information is protected by random permutation encryption and the rows and columns are disorganized to preserve texture information of images. Liu et al. [Liu, Shen, Xia et al.(2017)] proposed an image retrieval scheme based on difference histogram. In their scheme,two kinds of difference matrices (order difference and random order difference) are proposed, and the value replacement and location scrambling are utilized to encrypt the difference matrix. The difference histogram is extracted as image features by the server.

    In the above schemes, the cloud server undertakes the workload of feature extraction and image search, so the image owners only need to encrypt images. Inspired by those outsourced CBIR schemes, we propose a secure retrieval scheme with the combination of AC-coefficients and color histograms in the encrypted domain. The retrieval result shows that the combination of them outperforms individual utilization, and our retrieval accuracy is six percent higher than the proposed scheme in Liu et al. [Liu, Shen, Xia et al. (2017)].

    3 Program design and security model

    3.1 System model

    Our scheme mainly consists of three entities, i.e. the image owner, query user and cloud server, as shown in Fig. 1. The following are the assigned tasks of these three entities.

    Image owner:The image owner possesses a huge image dataset including large numbers of images, and the dataset is denoted aswith a corresponding identity numberThe image owner outsources the images to the server for cost saving and flexible utilization, and the outsourced images are encrypted to prevent the disclosure of privacy. The generated encrypted image set is denoted asThe image owner only needs to encrypt images and upload encrypted images to the server.

    Cloud server:The server stores the encrypted images from the image owner and undertakes the task of index generation and image search. Once receiving a search request, the server finds the most similar encrypted images from the encrypted image database and returns them to the query user.

    Query user:The query user wants to search the intended image from the encrypted image database. In order to protect the query image, the query user encrypts the query image to generate a query trapdoor and transmits the trapdoor to the server. The encryption process of query image is consistent with the database images’.

    Figure 1: System model

    3.2 Security models and assumptions

    As pointed out in the previous works [Kuzu, Islam and Kantarcioglu (2012); Ferreira,Rodrigues, Leitao (2017)], we believe that the cloud server is an honest but curious one.In other words, the server can accomplish tasks in accordance with the protocol, but it may analyze and speculate about the image data. In our scheme, the query users are believed to be trustworthy, so they will not disclose any private information of the images to the server during their communication process. The images to which the cloud has access are the encrypted ones, and the security strength of the encrypted images will be discussed in the Section 5.

    4 The proposed scheme

    4.1 Discrete cosine transform (DCT)

    Discrete cosine transform is an efficient transform which presents the texture information of an image in frequency domain. Typically, DCT is performed for each 8×8 size subblock. For an image with the size of M×N, the value f(i,j) represents the pixel value at the position (i,j) in the original image block. The transformation process can be formulated as:

    where A(u,v) is the DCT coefficient at position (u,v), c(u),and u=0,1,… ,M-1,v=0,1,… ,N-1. The resulting A(u,v) denotes

    DC coefficient whenu=0 and v=0, and the resulting A(u,v) denotes AC coefficient when u≠0 and v≠0.

    Each DCT sub-block consists of one DC coefficient and 63 AC coefficients. The DC coefficient is the average energy value of sub-block and contains main content of subblock. The remaining AC coefficients can be divided into three different categories according to their frequency. Most of energy in each block is concentrated in low frequency and middle frequency coefficients (i.e. in the upper left corner of the block),and most of high frequency coefficients in the lower right corner are equal to zero. The previous study [Fang, Cheng, Lin et al. (2012)] shows that AC coefficients can represent texture information of sub-block. The DC coefficients contain important image information,i.e., its histogram is important statistical information. In the proposed scheme, we do not utilize DC coefficient for image retrieval and encrypt them with the stream encryption technology. However, the AC coefficients contain rich edge and texture information of the image. We extract features from AC coefficients after encryption.

    4.2 Quantization and truncation operation

    The dynamic range of AC coefficients is one important factor. Our experiment with all database images shows that AC coefficients of Y component can vary in a large range [-682,683]. In order to achieve a certain level of efficiency, we need to truncate the coefficients into a limited range. Accordingly, truncation causes unrecoverable quality degradation and it certainly is a tradeoff between efficiency and quality. In fact,truncation does not influence image recovery much, which will be discussed in Section 6.In the process of AC coefficients encryption, AC coefficients are firstly quantized as:

    where Q is a quantization factor and equal to 1, the symbol A(u,v) denotes one AC coefficient value which locates at (u,v) in an image block of Y component. Quantization causes image information loss, however, the main content of image is trivially influenced.

    Figure 2: The distribution of AC coefficients in Y component

    Although AC coefficients vary in a large range, most of them locate around zero value, as is shown in Fig. 2. From the statistical histogram of AC coefficients, we can observe that AC coefficients are mostly within the range of [-20,20]. For efficiency, we truncate AC coefficients in a small interval [-d,d] without losing a lot of useful information. Tab. 1 presents the percentages of AC coefficients in different ranges, which shows that more than 90% of AC coefficients are contained in a truncated range especially when d is greater than 9. Therefore, the boundary coefficient d is chosen to be greater than 9 in the following experiment. The truncation operation is defined as:

    where if A(u,v)> d,truncd(A(u,v)) = d; if A(u,v) < -d,truncd(A(u,v)) =- d;if A(u,v)∈[-d,d], truncd(A(u,v)) = A(u,v).

    Table 1: The proportions of different range AC-coefficients

    4.3 Image encryption

    For encryption, we divide image data into three classes, i.e. DC coefficients in Y component, AC coefficients in Y component, and U and V color components. The encryption process is shown in Fig. 3. Above all, the discrete cosine transform is performed on the Y component, and the AC coefficients are quantized and truncated.Then, the image owner encrypts AC coefficients with value replacement and position scrambling and encrypts DC coefficients with stream cipher. The U and V color components are encrypted with the same encryption method but different keys as the encryption method of AC coefficients. We denote all keys in the whole encryption process as the symbol K, and

    Figure 3: Flow chart of encryption process

    4.3.1 Encryption of DC coefficients

    First, the DC coefficients of all images are converted to binary numbers. Second, all the binary numbers are combined together to generate a binary stream dj, where dj=(d1,d2,…,dm) and m is the length of the binary stream. Lastly, the DC coefficients are encrypted through exclusive or operation as:

    where D′denotes the encrypted DC coefficients and the private key kj=(k1,k2,…,km)has the same length as dj.

    4.3.2 Encryption of AC coefficients and U and V components

    The private key keyACis used to encrypt AC coefficients A(u,v) in the Y component.The value of the private key is in the range of [-d,d]. Let A′(u,v) denotes the corresponding encrypted coefficient in the encrypted Y component. The encryption process is described as:

    After above two encryption steps, the image owner gets the encrypted image set C=and sends it together withto the server. It is worth noting that the frequency information of each value in the image is not changed after encryption.

    4.4 Index generation and search operation

    Once receiving the encrypted image set, the cloud server extracts feature vectors from the encrypted images. In our proposed scheme, the server provides index construction and image query services, which greatly reduces computational burden of image owner. The following describes the index generation and search process.

    4.4.1 Index generation

    In the YUV color space, U and V channels represent Chrominance information and their AC coefficients provide texture information of a few. Therefore, two different histograms are considered in our scheme, which include the AC-coefficients histogram extracted from Y component and two color histograms extracted from U and V channels. These three histograms are combined into one feature vector to represent the image.

    First, AC-coefficients histogram is extracted from Y channel and the range of AC coefficients is [-d,d] as mentioned in Section 4.2. We denote AC-coefficients histogram as FACand its length as lenFAC=2d+1. Then, the color histogram features are extracted from the encrypted U and V channels and the range of the pixel values is [0,255]. We denote color histograms as F?{?∈(U,V)}and its length as { lenF?}?∈(U,V)=256. Finally, the final encrypted feature vector can be expressed as Fi={FAC,FU,FV}=(Fi1,… ,Fik,… ,FilenF)and its length is expressed as lenF=lenFAC+lenFU+lenFV,where i∈ (1,2,…,n)and n is the total number of images in the database. In order to achieve better performance of following retrieval work, the cloud server establishes oneto-one mapping relation between the encrypted database image and their corresponding feature vector as shown in Tab. 2.

    Table 2: Index construction

    4.4.2 Search operation

    Before sending a query image to the server, the query user needs to encrypt the query image as the image owner does to generate a query trapdoor Q. Once a query trapdoor is received from one query user, the cloud extracts a query image feature from the trapdoor,which is denoted as Qf=(Qf1,… ,Qfk,… ,QflenF). The similarity between the encrypted database image and the query image is measured by calculating the Manhattan distance between their respective feature vectors. Finally, the server returns the most similar images to the query user. The Manhattan distance dQFis calculated as:

    5 Security analysis

    It is well known that the cloud server is an honest-but-curious model. In addition to executing and completing our designated tasks, the cloud server may maliciously analyze and count the uploaded image data. The security strength of our scheme is analyzed under the cipher-text-only attack (COA) and brute-force attack.

    We summarize the functionality ? and corresponding leaked information of proposed scheme under COA model in Fig. 4. In the real environment, the interaction in our scheme involves three kinds of participants, including the image client, cloud server and query user. The honest-but-curious cloud server is considered as a potential attacker A in our scheme. In the ideal environment, we define a simulator S that can simulate the information leakages from the view of attacker A by using the functionality ?. Our proposed scheme can be proved secure if the difference of the two environments can be ignored. For security analysis, we expose three kinds of information to the cloud server(i.e. the encrypted images, features and query images). Therefore, the security analysis is performed based on these three aspects. On the basics of the existing encryption algorithms, we can conceive that it is computationally difficult for the server to gain plaintext images without knowing the private keys.

    Figure 4: The functionality F and information leakages in our scheme

    5.1 Security of image content

    The simulator S knows the size of image database and each image size in it. Therefore,the simulator S can simulate a fictitious image database ?Swhich resembles the real image database ?. However, the simulator S can only rig the whole image up through many different random sequences. As described in Section 4, the discrete cosine transform is performed in the images, and the resulting DC coefficient is encrypted by the stream cipher technology. Therefore, if the simulator S wants to obtain the original image,it needs to solve some random sequences. The simulator S needs to solve n random sequences for discrete cosine transform and 2mrandom sequences for stream cipher technology. The color value and position information is protected by value permutation and position scrambling respectively, and different keys are used in three components.Therefore, the simulator S needs to solve (2d+1)!×(256!)2random sequences for value permutation encryption. The security strength of the position information depends on the size of image, so the security strength of the position information is (imgsize!)3.The key space for database image can be expressed as SecImg, SecImg=2m×n×(2d+1)!×(256!)2×(imgsize!)3.

    5.2 Security of image features

    The image features in proposed scheme are the combination of AC-coefficients histograms in the Y component and color histograms in the U and V component. The simulator S can extract the histograms from the fictitious image database ?Ssimilarly,and the security strength of image feature depends on the value permutation. The key space for image features can be expressed as (2d+1)!×(256!)2.

    5.3 Security of trapdoor

    The encryption method of the query image and database images are same, so the security strength of encrypted image is similar to the encrypted database image. The key space for query image is equal to SecImg. Apparently, the key space is large enough to withstand the brute-force attack.

    6 Experimental results

    The scheme is implemented by MatLabR2012b and the experiments are performed on the computer with the Intel Pentium CPU 3.3 GHz and 4 GB memory. The database we use is INRIA Holidays database [Chen and Shi (2008)]. The database is composed of 1491 images which are divided into 500 categories, and the first image in each category is used as a query image. To examine whether the truncation and quantization processes affect the image recovery process or not, we calculate the peak signal to noise ratio (PSNR)values between the original image and recovery image. The PSNR values in Tab. 3 show that the truncation and quantization operation is acceptable and the encrypted images can be restored after decryption.

    Table 3: PSNR values in different coefficient ranges

    6.1 Encryption effect

    We use the first image in the INRIA Holidays database to show our encryption effect.The Fig. 5 shows the original image and the YUV color components of it.

    Figure 5: The Y, U and V component of a color image. (a) Original image. (b) Y color component. (c) U color component. (d) V color component

    In proposed scheme, the discrete cosine transform is performed on the Y component. The encryption algorithm of U and V components are same as the AC coefficients of Y component, so we take Y component as an example to show the encryption effect presented in Fig. 6. The Fig. 7 shows the original image and its final encrypted form.

    Figure 6: Encryption effect of Y component. (a) Y component after discrete cosine transform. (b) Value permutation. (c) Position scrambling. (d) Encrypted Y component

    Figure 7: Original image and final encrypted image

    6.2 Retrieval accuracy

    The mean average precision (mAP) value is used to measure retrieval performance of the proposed scheme. For mAP calculation, the retrieval precision is defined as the number of retrieved relevant images divided by the total number of retrieved images. Similarly,the recall rate is defined as the number of retrieved relevant images divided by the total number of relevant images in the image database. Finally, the mAP value is the mean value between the precision and the recall rate, which solves the single limitation problem. We use an evaluation package of Inria Holidays Database in python environment to figure out the mAP of our scheme.

    6.2.1 Retrieval accuracy in different AC-coefficient ranges

    AC coefficients in different intervals are selected to perform experiment as shown in Tab.4. The best retrieval accuracy is 52.938 when the range of AC coefficient is [-60,60].We can also observe that the different intervals have no great influence on the retrieval accuracy. The reason is that the coefficient intervals chosen to contain more than 90% of AC coefficients and they can represent most of image information.

    Table 4: The mAP in different coefficient ranges

    6.2.2 Retrieval accuracy comparison

    We have compared the retrieval accuracy of our scheme with Lu’s scheme [Lu,Swaminathan, Varna et al. (2009)], Ferreira’s scheme [Ferreira, Rodrigues, Leitao et al.(2017)] and Liu’s scheme [Liu, Shen, Xia et al. (2017)], the comparison result is shown in Tab. 5. We have realized Ferreira’s and Liu’s scheme. The image features in Ferreira’s scheme are all normalized and then compute the outcome. The mAP in Liu’s scheme is calculated through an evaluation package of Inria Holidays Database in python environment. Comparing with previous typical schemes, our scheme can achieve better retrieval performance.

    Table 5: Comparison of previous schemes

    6.2.3 Retrieval accuracies of our schemes

    We have also calculated the retrieval accuracies for three different types of feature set and the results are shown in Tab. 6. The first feature set is denoted as AC_YUV. We extract AC-coefficients histograms from YUV color components. Furthermore, we give the retrieval accuracy of AC-coefficients histogram extracted from each component, and those are denoted as AC_Y,AC_U and AC_V. The second feature set is denoted as color_YUV, where color histograms are extracted from YUV color components. The third feature set is denoted as ACCH, where AC-coefficients histogram is extracted from Y component and color histograms are extracted from the other two color components.

    Finally, we summarize some observations from above experiments. Tab. 6 shows that the retrieval accuracy of Y component (AC_Y) is better than other components (AC_U, AC_V)and is close to three components together (AC_YUV). The retrieval accuracy of the AC-coefficients and color histograms (ACCH) combination is better than color histogram only(color_YUV) or AC-coefficients histogram only (AC_YUV). Obviously, the Y component contains texture information more, and the U and V components contain color information more. This is why the retrieval accuracy of the third set (ACCH) is higher than the first two sets’ (AC_YUV and color_YUV).

    Table 6: The mAP of three feature sets

    6.3 Retrieval efficiency

    Efficiency is an important indicator to measure the usability of proposed scheme. In our scheme, the retrieval efficiency contains the time consumption of image encryption,index construction and image searching. The time consumption for image encryption contains value permutation and position scrambling. The time for index construction contains feature extraction and indexing. When receiving an encrypted query image, the server searches the index for similar images. A liner index is built in our scheme, so the search time is relevant to the length of feature vectors. Tab. 7 lists the time consumption of three mentioned experiments.

    Table 7: Time consumption of three experiments

    7 Conclusion

    This paper proposes a secure image retrieval scheme with the combination of the AC-coefficients and color histograms. The proposed scheme consists of three operations: i.e.image encryption, index construction and image search. Except the image encryption operation, other operations are outsourced to the cloud server. The images are protected by using stream encryption technology, values replacement and position scrambling encryption algorithms. The security strength of exposed information is computationally analyzed. We further examined and compared the retrieval accuracy of three feature sets.The comparison result shows that the combination of AC-coefficients and color histograms achieves the highest retrieval accuracy. In the future work, we will consider the combination of color feature from DC coefficient and texture feature from AC coefficients to achieve higher retrieval accuracy.

    Acknowledgement:This work is supported in part by the National Natural Science Foundation of China under grant numbers 61672294, 61502242, 61702276, U1536206,U1405254, 61772283, 61602253, 61601236 and 61572258, in part by Six peak talent project of Jiangsu Province (R2016L13), in part by National Key R&D Program of China under grant 2018YFB1003205, in part by NRF-2016R1D1A1B03933294, in part by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530, in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund, in part by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET)fund, China. Zhihua Xia is supported by BK21+ program from the Ministry of Education of Korea.

    波多野结衣高清无吗| 黄色片一级片一级黄色片| 亚洲成人久久爱视频| 欧美乱色亚洲激情| 欧美一区二区精品小视频在线| 999精品在线视频| 他把我摸到了高潮在线观看| 亚洲av熟女| 成人手机av| 99国产精品一区二区蜜桃av| 最近最新中文字幕大全免费视频| 久久久精品国产亚洲av高清涩受| 成人精品一区二区免费| 久久久久久免费高清国产稀缺| 一区福利在线观看| а√天堂www在线а√下载| 国产精华一区二区三区| 午夜久久久在线观看| 9191精品国产免费久久| 午夜免费成人在线视频| 国产亚洲欧美在线一区二区| 成年人黄色毛片网站| 高清在线国产一区| 久热爱精品视频在线9| 美女免费视频网站| 99国产精品一区二区蜜桃av| 国产高清videossex| 美女国产高潮福利片在线看| 亚洲成人精品中文字幕电影| 国产黄色小视频在线观看| 后天国语完整版免费观看| 欧美中文综合在线视频| 亚洲最大成人中文| 一区福利在线观看| 国产成人影院久久av| xxxwww97欧美| 真人做人爱边吃奶动态| 婷婷精品国产亚洲av在线| 久久久久久大精品| 日韩一卡2卡3卡4卡2021年| 免费在线观看日本一区| 999久久久国产精品视频| 亚洲成人国产一区在线观看| 欧美色视频一区免费| 国产激情久久老熟女| 国产99久久九九免费精品| 黄色成人免费大全| 香蕉av资源在线| 欧美日韩乱码在线| 色综合欧美亚洲国产小说| 麻豆一二三区av精品| 亚洲成人久久性| 岛国视频午夜一区免费看| 国产高清有码在线观看视频 | www.www免费av| 午夜福利成人在线免费观看| 国产精品一区二区精品视频观看| 精华霜和精华液先用哪个| 亚洲av成人av| 亚洲五月婷婷丁香| 国产精品电影一区二区三区| 亚洲av成人不卡在线观看播放网| 欧美日韩中文字幕国产精品一区二区三区| 老司机午夜十八禁免费视频| 成人永久免费在线观看视频| 精品国产一区二区三区四区第35| a级毛片在线看网站| 中出人妻视频一区二区| 国产黄片美女视频| 国产精品,欧美在线| 一边摸一边抽搐一进一小说| 黄色丝袜av网址大全| 国产精品亚洲一级av第二区| 男女床上黄色一级片免费看| 两性夫妻黄色片| 久久久久久久久免费视频了| 日韩欧美 国产精品| 国产欧美日韩精品亚洲av| 后天国语完整版免费观看| 脱女人内裤的视频| 久久欧美精品欧美久久欧美| 琪琪午夜伦伦电影理论片6080| 少妇裸体淫交视频免费看高清 | 成年人黄色毛片网站| 亚洲一区二区三区色噜噜| 此物有八面人人有两片| 久久久国产欧美日韩av| 国产欧美日韩一区二区三| 黄色视频不卡| a级毛片在线看网站| 日韩有码中文字幕| 女警被强在线播放| 免费看日本二区| 日本一本二区三区精品| 久久精品国产综合久久久| 在线观看舔阴道视频| 亚洲专区国产一区二区| 亚洲全国av大片| 男女下面进入的视频免费午夜 | 亚洲aⅴ乱码一区二区在线播放 | 9191精品国产免费久久| 亚洲 欧美一区二区三区| 亚洲 国产 在线| 欧美日韩中文字幕国产精品一区二区三区| 日韩有码中文字幕| 亚洲国产精品合色在线| 他把我摸到了高潮在线观看| 一级作爱视频免费观看| 无限看片的www在线观看| 村上凉子中文字幕在线| 国产91精品成人一区二区三区| 亚洲人成77777在线视频| 亚洲aⅴ乱码一区二区在线播放 | 亚洲av第一区精品v没综合| 欧美色欧美亚洲另类二区| 欧美成人免费av一区二区三区| 美女扒开内裤让男人捅视频| 国产精品一区二区免费欧美| 国产亚洲精品av在线| 日本成人三级电影网站| 国产男靠女视频免费网站| 日本精品一区二区三区蜜桃| 日本 欧美在线| xxxwww97欧美| 成人手机av| 免费高清视频大片| av视频在线观看入口| 亚洲成人久久爱视频| 久久久久精品国产欧美久久久| 色播在线永久视频| 一区二区三区高清视频在线| 美女大奶头视频| 国产精品,欧美在线| 国产伦人伦偷精品视频| 91国产中文字幕| 女人被狂操c到高潮| 中出人妻视频一区二区| 欧美一级a爱片免费观看看 | 国产熟女午夜一区二区三区| 丰满人妻熟妇乱又伦精品不卡| 日本 av在线| 欧美国产精品va在线观看不卡| 99国产极品粉嫩在线观看| 国产午夜精品久久久久久| 精品久久久久久久末码| 国产视频内射| 人妻丰满熟妇av一区二区三区| 777久久人妻少妇嫩草av网站| 最好的美女福利视频网| 在线免费观看的www视频| 亚洲国产欧美一区二区综合| 99在线视频只有这里精品首页| 高清毛片免费观看视频网站| 免费看十八禁软件| 很黄的视频免费| 国产精品永久免费网站| 一级毛片女人18水好多| 久久精品国产综合久久久| 白带黄色成豆腐渣| 久久久久久免费高清国产稀缺| 成人三级黄色视频| 国产成年人精品一区二区| 日日干狠狠操夜夜爽| 一级作爱视频免费观看| 美女扒开内裤让男人捅视频| 国产亚洲精品综合一区在线观看 | 熟妇人妻久久中文字幕3abv| 亚洲 欧美 日韩 在线 免费| 亚洲全国av大片| 欧美黄色片欧美黄色片| 99国产精品一区二区蜜桃av| aaaaa片日本免费| 精品国内亚洲2022精品成人| 日韩中文字幕欧美一区二区| 巨乳人妻的诱惑在线观看| 露出奶头的视频| 免费在线观看黄色视频的| 高清毛片免费观看视频网站| 极品教师在线免费播放| 国产av一区二区精品久久| 欧美激情高清一区二区三区| 好男人在线观看高清免费视频 | 午夜久久久在线观看| 国产亚洲精品av在线| 亚洲精品国产区一区二| 老熟妇仑乱视频hdxx| 黄色女人牲交| 给我免费播放毛片高清在线观看| 99久久国产精品久久久| 午夜免费鲁丝| 国产精品1区2区在线观看.| 国产三级在线视频| 日韩成人在线观看一区二区三区| 欧美最黄视频在线播放免费| 亚洲午夜精品一区,二区,三区| 美女午夜性视频免费| 午夜亚洲福利在线播放| 亚洲成国产人片在线观看| 无人区码免费观看不卡| 性色av乱码一区二区三区2| 真人一进一出gif抽搐免费| av中文乱码字幕在线| 久久久久免费精品人妻一区二区 | bbb黄色大片| 中文字幕另类日韩欧美亚洲嫩草| 草草在线视频免费看| 老司机靠b影院| 国产熟女xx| 成人欧美大片| 免费在线观看成人毛片| 欧美成人性av电影在线观看| 一区福利在线观看| 国产99白浆流出| 国产精品免费一区二区三区在线| 亚洲 欧美 日韩 在线 免费| 色综合婷婷激情| 亚洲男人的天堂狠狠| 久久亚洲真实| 亚洲成av片中文字幕在线观看| 国产午夜福利久久久久久| 亚洲中文日韩欧美视频| 99久久综合精品五月天人人| 亚洲五月天丁香| 99在线人妻在线中文字幕| 亚洲美女黄片视频| 亚洲人成网站在线播放欧美日韩| 国产激情欧美一区二区| 最新在线观看一区二区三区| 欧美成人一区二区免费高清观看 | 别揉我奶头~嗯~啊~动态视频| 中文字幕最新亚洲高清| 婷婷亚洲欧美| 久久精品国产清高在天天线| 香蕉国产在线看| 热re99久久国产66热| 99re在线观看精品视频| 一夜夜www| 国产精品 欧美亚洲| 变态另类成人亚洲欧美熟女| 欧美黄色片欧美黄色片| 最近在线观看免费完整版| 黄色毛片三级朝国网站| 国产爱豆传媒在线观看 | 久久久国产精品麻豆| 久久久久久久午夜电影| 51午夜福利影视在线观看| 久久草成人影院| 国产高清videossex| 国产精品亚洲av一区麻豆| 大型av网站在线播放| 国产一区二区激情短视频| 日韩精品免费视频一区二区三区| 丝袜在线中文字幕| 少妇裸体淫交视频免费看高清 | 免费女性裸体啪啪无遮挡网站| 老司机福利观看| 91老司机精品| 我的亚洲天堂| 亚洲成人免费电影在线观看| 久久人人精品亚洲av| 变态另类丝袜制服| 免费看十八禁软件| 亚洲欧美日韩高清在线视频| 一进一出抽搐gif免费好疼| 国产成人欧美| 伊人久久大香线蕉亚洲五| 亚洲狠狠婷婷综合久久图片| 精品欧美国产一区二区三| 99re在线观看精品视频| 国产伦人伦偷精品视频| 国内久久婷婷六月综合欲色啪| 在线观看66精品国产| 久久中文看片网| 一边摸一边抽搐一进一小说| 在线av久久热| 精品第一国产精品| 两性午夜刺激爽爽歪歪视频在线观看 | 18禁国产床啪视频网站| 长腿黑丝高跟| 十八禁网站免费在线| 在线永久观看黄色视频| 啦啦啦免费观看视频1| 欧美日本亚洲视频在线播放| 999久久久国产精品视频| 妹子高潮喷水视频| 亚洲精品一卡2卡三卡4卡5卡| 国产熟女xx| 久久 成人 亚洲| 久久国产精品人妻蜜桃| 免费看日本二区| av片东京热男人的天堂| av超薄肉色丝袜交足视频| 亚洲片人在线观看| 成人av一区二区三区在线看| 欧美 亚洲 国产 日韩一| 脱女人内裤的视频| 国产片内射在线| 国产成人啪精品午夜网站| 精品无人区乱码1区二区| 大香蕉久久成人网| 大型av网站在线播放| 免费女性裸体啪啪无遮挡网站| 国产精品九九99| 亚洲精品美女久久av网站| 国产一卡二卡三卡精品| 国产主播在线观看一区二区| www日本黄色视频网| 国产精品久久久av美女十八| 一进一出抽搐gif免费好疼| 久热爱精品视频在线9| 欧美日韩瑟瑟在线播放| 又黄又粗又硬又大视频| 国产亚洲精品综合一区在线观看 | 精品一区二区三区四区五区乱码| 欧美色视频一区免费| 亚洲男人的天堂狠狠| www日本在线高清视频| 一区二区三区高清视频在线| 91麻豆精品激情在线观看国产| 亚洲性夜色夜夜综合| 99在线视频只有这里精品首页| 正在播放国产对白刺激| 中文字幕久久专区| 精品高清国产在线一区| 脱女人内裤的视频| 久久久久久久久中文| 亚洲国产日韩欧美精品在线观看 | 夜夜夜夜夜久久久久| 97超级碰碰碰精品色视频在线观看| 桃色一区二区三区在线观看| 久久精品国产99精品国产亚洲性色| 欧美中文日本在线观看视频| 性欧美人与动物交配| 亚洲天堂国产精品一区在线| 少妇粗大呻吟视频| 一个人免费在线观看的高清视频| 欧美人与性动交α欧美精品济南到| 丰满人妻熟妇乱又伦精品不卡| 国产成人欧美| 国产一区二区在线av高清观看| 桃红色精品国产亚洲av| 成人18禁在线播放| 国产精品乱码一区二三区的特点| 韩国精品一区二区三区| 亚洲精品美女久久av网站| 一级作爱视频免费观看| 成年免费大片在线观看| 成人三级做爰电影| 最近最新中文字幕大全电影3 | 国产精品亚洲美女久久久| 亚洲va日本ⅴa欧美va伊人久久| 国产黄片美女视频| 欧美日韩黄片免| www.自偷自拍.com| 最好的美女福利视频网| av在线播放免费不卡| 免费在线观看完整版高清| 老汉色av国产亚洲站长工具| 国产亚洲欧美在线一区二区| 丝袜美腿诱惑在线| 色播亚洲综合网| 久久性视频一级片| 在线观看免费午夜福利视频| 日本撒尿小便嘘嘘汇集6| 国产视频内射| svipshipincom国产片| 99国产综合亚洲精品| 久久中文字幕人妻熟女| 欧美成人性av电影在线观看| 18禁裸乳无遮挡免费网站照片 | 女人被狂操c到高潮| 国内久久婷婷六月综合欲色啪| 高潮久久久久久久久久久不卡| 正在播放国产对白刺激| 日日摸夜夜添夜夜添小说| 国产成+人综合+亚洲专区| 少妇 在线观看| 日韩免费av在线播放| 搡老岳熟女国产| 亚洲第一青青草原| 黄色视频,在线免费观看| 欧美黑人巨大hd| 亚洲人成电影免费在线| 精品欧美一区二区三区在线| 黑人欧美特级aaaaaa片| 好看av亚洲va欧美ⅴa在| 亚洲人成网站在线播放欧美日韩| 午夜福利高清视频| 精华霜和精华液先用哪个| 国产一区二区在线av高清观看| 在线av久久热| 亚洲国产精品合色在线| 免费一级毛片在线播放高清视频| 久久 成人 亚洲| 国产乱人伦免费视频| 国产精品综合久久久久久久免费| www日本黄色视频网| 国产一区二区激情短视频| 免费搜索国产男女视频| 国产成人一区二区三区免费视频网站| 老司机午夜福利在线观看视频| 午夜免费鲁丝| 岛国在线观看网站| 欧美亚洲日本最大视频资源| 啦啦啦免费观看视频1| 久久精品影院6| 国产精品久久久久久人妻精品电影| 男人操女人黄网站| 成人永久免费在线观看视频| 精品乱码久久久久久99久播| 法律面前人人平等表现在哪些方面| 曰老女人黄片| 19禁男女啪啪无遮挡网站| 国产成人啪精品午夜网站| 亚洲 国产 在线| 午夜福利在线观看吧| 亚洲欧美日韩高清在线视频| 色在线成人网| 国产高清有码在线观看视频 | 亚洲男人天堂网一区| 夜夜爽天天搞| 亚洲人成伊人成综合网2020| 精品第一国产精品| 精品熟女少妇八av免费久了| 国产免费男女视频| 久久久久国产精品人妻aⅴ院| 精品少妇一区二区三区视频日本电影| 午夜影院日韩av| 欧美激情极品国产一区二区三区| 黄色丝袜av网址大全| 丁香欧美五月| 成年免费大片在线观看| 欧美+亚洲+日韩+国产| 久久香蕉激情| 亚洲精品国产区一区二| 一本久久中文字幕| 一级a爱视频在线免费观看| 亚洲七黄色美女视频| 国产成+人综合+亚洲专区| 90打野战视频偷拍视频| 国产1区2区3区精品| 久久久水蜜桃国产精品网| 欧美大码av| 两个人免费观看高清视频| 日本三级黄在线观看| 国产又色又爽无遮挡免费看| 国产精品亚洲av一区麻豆| 亚洲欧美日韩无卡精品| 午夜精品久久久久久毛片777| 在线观看免费视频日本深夜| 精品久久久久久久毛片微露脸| 一级毛片女人18水好多| 欧美激情 高清一区二区三区| 欧美一级毛片孕妇| 亚洲真实伦在线观看| 欧美日韩福利视频一区二区| 一边摸一边做爽爽视频免费| 丰满的人妻完整版| e午夜精品久久久久久久| ponron亚洲| 精品欧美国产一区二区三| 在线观看免费视频日本深夜| 日韩av在线大香蕉| 欧美日韩瑟瑟在线播放| 狠狠狠狠99中文字幕| 亚洲专区字幕在线| 亚洲av电影在线进入| 欧美一级a爱片免费观看看 | 亚洲 欧美 日韩 在线 免费| 男人的好看免费观看在线视频 | 久久欧美精品欧美久久欧美| 日本一区二区免费在线视频| 国产爱豆传媒在线观看 | 老司机午夜福利在线观看视频| 亚洲真实伦在线观看| 97超级碰碰碰精品色视频在线观看| 99国产极品粉嫩在线观看| x7x7x7水蜜桃| 每晚都被弄得嗷嗷叫到高潮| 国产精华一区二区三区| 少妇 在线观看| 欧美黑人巨大hd| 欧美国产精品va在线观看不卡| 国产亚洲欧美在线一区二区| 丁香六月欧美| 久久久久久大精品| 免费观看精品视频网站| 变态另类丝袜制服| 国产成人av激情在线播放| 国产精品,欧美在线| 丰满人妻熟妇乱又伦精品不卡| 午夜福利一区二区在线看| 国产激情久久老熟女| 少妇被粗大的猛进出69影院| 免费高清在线观看日韩| 丁香六月欧美| 亚洲狠狠婷婷综合久久图片| 亚洲国产日韩欧美精品在线观看 | 男人操女人黄网站| 老汉色∧v一级毛片| www.999成人在线观看| 国产成人一区二区三区免费视频网站| 好男人电影高清在线观看| 久久香蕉激情| 嫩草影视91久久| 99久久国产精品久久久| 村上凉子中文字幕在线| 久久久久国产一级毛片高清牌| 村上凉子中文字幕在线| 女人被狂操c到高潮| 无遮挡黄片免费观看| 婷婷丁香在线五月| 巨乳人妻的诱惑在线观看| www.精华液| 欧美午夜高清在线| 国产成人av激情在线播放| 男女床上黄色一级片免费看| 亚洲天堂国产精品一区在线| 黄色女人牲交| 一本精品99久久精品77| 宅男免费午夜| 国产片内射在线| 日韩欧美一区二区三区在线观看| 高清在线国产一区| 久久中文看片网| 久久国产精品人妻蜜桃| 18禁国产床啪视频网站| 高清在线国产一区| 国产精品,欧美在线| 九色国产91popny在线| 草草在线视频免费看| 欧洲精品卡2卡3卡4卡5卡区| 丰满的人妻完整版| 伦理电影免费视频| 欧美午夜高清在线| 亚洲天堂国产精品一区在线| 国产精品,欧美在线| xxx96com| 国产精品一区二区三区四区久久 | 国语自产精品视频在线第100页| 俺也久久电影网| 久久久久久免费高清国产稀缺| 日韩高清综合在线| 麻豆一二三区av精品| 啦啦啦 在线观看视频| 黄色毛片三级朝国网站| 国产一区二区在线av高清观看| 波多野结衣巨乳人妻| 国产精品一区二区三区四区久久 | 亚洲国产欧美日韩在线播放| 真人一进一出gif抽搐免费| 麻豆成人av在线观看| 国产精品久久久久久人妻精品电影| 女性被躁到高潮视频| 免费在线观看亚洲国产| 国产熟女xx| 男女之事视频高清在线观看| 欧美精品啪啪一区二区三区| av视频在线观看入口| 免费在线观看视频国产中文字幕亚洲| 长腿黑丝高跟| 久久久久久久久中文| 中文字幕另类日韩欧美亚洲嫩草| 少妇熟女aⅴ在线视频| 欧美黑人巨大hd| 国产成人欧美| 两人在一起打扑克的视频| 午夜福利欧美成人| 日韩欧美国产在线观看| 亚洲av成人av| 香蕉久久夜色| 亚洲成人免费电影在线观看| 久久天躁狠狠躁夜夜2o2o| 女人爽到高潮嗷嗷叫在线视频| 亚洲欧美一区二区三区黑人| 九色国产91popny在线| 精品乱码久久久久久99久播| 国产99久久九九免费精品| 淫秽高清视频在线观看| 女人爽到高潮嗷嗷叫在线视频| 亚洲aⅴ乱码一区二区在线播放 | 一级毛片精品| 午夜福利免费观看在线| 又黄又粗又硬又大视频| 一个人观看的视频www高清免费观看 | 欧美日韩黄片免| 午夜老司机福利片| 美女免费视频网站| www.熟女人妻精品国产| 亚洲成人国产一区在线观看| 日日夜夜操网爽| 久久人妻福利社区极品人妻图片| 亚洲最大成人中文| 一本久久中文字幕| 成人国产一区最新在线观看| 欧美中文日本在线观看视频| 丰满的人妻完整版| 国产精品野战在线观看| 99国产综合亚洲精品| 亚洲精品一卡2卡三卡4卡5卡| 香蕉国产在线看| 午夜影院日韩av| 国产av一区在线观看免费| 波多野结衣高清作品| 国产熟女xx| 亚洲五月天丁香| 免费在线观看影片大全网站| 99久久精品国产亚洲精品| 久久国产精品人妻蜜桃| 久久精品aⅴ一区二区三区四区| 久久国产精品人妻蜜桃| 黄色视频不卡| 国产成+人综合+亚洲专区| 人成视频在线观看免费观看| 妹子高潮喷水视频|