KR101444828B1 - Method for storing encrypted image and searching the image - Google Patents

Method for storing encrypted image and searching the image Download PDF

Info

Publication number
KR101444828B1
KR101444828B1 KR1020140052402A KR20140052402A KR101444828B1 KR 101444828 B1 KR101444828 B1 KR 101444828B1 KR 1020140052402 A KR1020140052402 A KR 1020140052402A KR 20140052402 A KR20140052402 A KR 20140052402A KR 101444828 B1 KR101444828 B1 KR 101444828B1
Authority
KR
South Korea
Prior art keywords
image
region
interest
binary pattern
local binary
Prior art date
Application number
KR1020140052402A
Other languages
Korean (ko)
Inventor
홍영식
정장영
정준호
Original Assignee
동국대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 동국대학교 산학협력단 filed Critical 동국대학교 산학협력단
Priority to KR1020140052402A priority Critical patent/KR101444828B1/en
Application granted granted Critical
Publication of KR101444828B1 publication Critical patent/KR101444828B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The present invention relates to a method of storing and retrieving an encrypted image, wherein an image retrieval system for an encrypted image retrieval system comprises: an image retrieval system configured to set at least one region of interest in an image to be stored by the image retrieval system; It creates a binary pattern, encrypts the image, concatenates the encrypted image with the local binary pattern, stores it in the data server, extracts feature information of the region of interest, creates an index for image retrieval, and stores the generated index in the data server do.

Description

A method for storing and retrieving an encrypted image,

The present invention relates to a technique of storing image data in a server and retrieving the image data. More particularly, the present invention relates to a technique for storing an encrypted image, which is not a typical image, in a data server, A storage medium storing a method of storing images, a searching method, and a recording medium recording the methods.

In the case of images used in medical, military, research, broadcasting, etc., there are many contents dealing with privacy and confidentiality. When these images are exposed to the public or acquired by a malicious user, . In addition, unlike ordinary document data, since images are perceptually recognized, there is a fear that wrong information may be delivered to the user if the user can not recognize any of the images even though the images are distorted.

Conventionally, the simplest method for retrieving encrypted data is to use keywords. In other words, when a search query was received using a keyword, the encrypted data was decrypted and converted to a plain text, and the retrieval was performed. However, researchers have developed a searchable encryption method that can perform search without data decryption by pre-indexing keywords before encrypting and storing the data. . The prior art cited below introduces the technology trend of the cryptographic-based technology and the general system structure that enable the retrieval of the desired data without decrypting the encrypted data as described above.

On the other hand, there has been much progress in image encryption technology. However, it has been pointed out that a conventional keyword-based searchable encryption system is not suitable for encrypted image retrieval. Therefore, there is a need for techniques to search encrypted images more efficiently.

In addition, even if most data servers are securely managed, there is still a possibility that they may be exposed to malicious users, and there is a risk that the files stored on the data server may be tampered with. In consideration of such a risk, a technical means is required to verify the integrity of the image file at the same time as the retrieval of the data in order to verify the file's tampering.

 (2008 년 8 월) pp.1-9 1225-6455, Korea Electronics and Telecommunications Research Institute, 2008, Korea Electronics and Telecommunications Research Institute year.

SUMMARY OF THE INVENTION The present invention has been made in view of the above problems, and it is an object of the present invention to provide an image storage and retrieval system that is vulnerable to security of image data, and unlike an image retrieval system, In order to solve the problem that no technical means exists and to verify the integrity of the encrypted image to be returned as a result of retrieval, it is desired to overcome a lot of system resource and time limit in the conventional integrity verification technology.

According to an aspect of the present invention, there is provided a method for storing an image for an encrypted image search, the method comprising: setting at least one region of interest (ROI) in an image to be stored by the image search system; ; The image search system generating a local binary pattern (LBP) based on the set region of interest; Encrypting the image, concatenating the encrypted image with the local binary pattern and storing the concatenated image in a data server; And the image search system extracts feature information of the set region of interest to generate an index for image search, and storing the generated index in the data server.

In the image storing method according to an exemplary embodiment, the step of generating the local binary pattern may include a step of generating a local binary pattern for each pixel constituting the set region of interest, And converts the neighboring pixels into a binary pattern based on the calculated pixel value difference.

In the image storing method according to an exemplary embodiment, the step of generating the local binary pattern may include generating junk data of an image region corresponding to the region of interest using a random number function; Performing an XOR operation on the set region of interest and the junk data; And performing permutation on the exclusive OR computed data, wherein the local binary pattern can be generated based on the permutated data.

In the image storing method according to an exemplary embodiment, the feature information of the ROI may include coordinate information and color information for an edge or a corner of the ROI.

In the image storage method according to an embodiment, the encrypted image stored in the data server is added to the local binary pattern for the region of interest such that when an image search query is received, And performs integrity verification only on the area of interest.

In the image storing method according to an embodiment, the region of interest may be a region in which the change of the pixel value in the image region is determined to be equal to or higher than a threshold, or a region input by the user.

According to another aspect of the present invention, there is provided a method for searching an encrypted image in an image search system, the method comprising: receiving a local binary pattern generated based on a region of interest in an image, Storing in advance; Extracting feature information of the ROI from the data server and storing an index of a keyword derived within a similarity range of the feature information for each image; The data server receiving an image search query from a user using a trapdoor; The data server reading the local binary pattern associated with the encrypted image corresponding to the feature information of the ROI using the trap door; And the data server provides a trusted third party (TTP) with the read encrypted image and a local binary pattern to cause the trusted authority to check the integrity of the entire encrypted image based on the local binary pattern ;

In the image search method according to another embodiment of the present invention, the local binary pattern may include a pixel value of neighboring pixels surrounding the pixel with respect to each pixel constituting the region of interest set in the image, And converting the peripheral pixels into a binary pattern based on the calculated pixel value difference.

In the image search method according to another embodiment, the feature information of the ROI includes coordinate information and color information for an edge or a corner of the ROI, and the image search query is a search that combines the feature information of the ROI Frame, and can be searched through the trap door at the time of searching to conceal information about the search target.

In the image retrieval method according to another embodiment, the encrypted image stored in the data server is added with the local binary pattern for the region of interest, so that when the image retrieval query is received, Only perform integrity verification on the realm.

The present invention also provides a computer-readable recording medium storing a program for causing a computer to execute the image storing method and the image searching method described above.

Embodiments of the present invention can save resources and reduce overhead in operations by performing an integrity check using a local binary pattern only for a region of interest rather than the entire image region, In addition to enabling fast searching with the image encrypted through the local binary pattern, it is possible to complete the integrity verification at the same time as returning the image search result.

FIG. 1 is a diagram showing a general structure of an image retrieval system adopted by embodiments of the present invention.
2 is a flowchart illustrating an image storage method for encrypted image retrieval according to an embodiment of the present invention.
FIG. 3 is a view for explaining an image processing procedure for integrity verification in the image storing method of FIG. 2 according to an embodiment of the present invention.
4 is a diagram illustrating a process of setting a region of interest in an image in an image storing method according to an embodiment of the present invention.
5 is an example of a pseudo code that implements a function of processing coordinates of a region of interest set in an image in an image storing method according to an embodiment of the present invention.
6 is a diagram for explaining a process of generating a local binary pattern in an image storing method according to an embodiment of the present invention.
7 is a flowchart illustrating a method for retrieving an encrypted image in an image retrieval system according to another embodiment of the present invention.
8 is a diagram illustrating a query frame structure for an encrypted image search in the image search method according to another embodiment of the present invention.
9 is a diagram for explaining a search process using a trap door in the image search method according to another embodiment of the present invention.

Before describing the embodiments of the present invention, the embodiments of the present invention present problems occurring in an environment in which they are implemented and utilized, and present basic ideas of the present invention based on them.

In the case of a conventional search technology, in the process of performing indexing or keyword search, a malicious user is hidden in the network and observes the process of exchanging normal data, Lt; / RTI > Although the encrypted retrieval system has been introduced due to such problems, the encrypted retrieval system developed so far has focused on the retrieval technology for keyword-oriented text documents, and there is no retrieval technique for encrypted images.

On the other hand, considering the technical means for ensuring the integrity of the encrypted image, in order to verify the integrity of the entire image, it is necessary to consider the size of image data that is currently utilized. That is, when the size of the recent image is explosively increasing (SHV, 4K, 8K) and verification is performed using MD5 or SHA, which is a conventional technical means, the following problems are expected.

First, the problem of collision pairs has already been announced for MD5. This means that the image can be shifted or modulated. If the user stores the image using MD5, it means that the image having the same collision value can be inserted or shifted or modulated.

Second, the case of SHA also shows the possibility of problems or problems. Therefore, a separate algorithm is needed to verify the integrity of the image.

Third, the image must be able to be detected even if there is a change in the image. In the case of images, it is necessary to act sensitively to the partial stigmata of the perceptual data image.

Accordingly, embodiments of the present invention to be described below are intended to verify the integrity of an image using a local binary pattern (LBP) that can be utilized in pattern matching in order to solve the problem described above. In addition, attention is paid to the problem that a large amount of data storage space is required for a typical local binary pattern operation. In order to solve this problem, embodiments of the present invention attempt to verify integrity by designating only a part of the image area as a region of interest (ROI), thereby reducing the size of the data space required in the integrity verification process I want to.

Hereinafter, embodiments of the present invention will be described in more detail with reference to the accompanying drawings. In the following description and the accompanying drawings, detailed description of well-known functions or constructions that may obscure the subject matter of the present invention will be omitted. It should be noted that the same constituent elements are denoted by the same reference numerals as possible throughout the drawings.

1 shows a general structure of an image retrieval system adopted by embodiments of the present invention, and includes a user 10, a trusted third party (TTP) 20, and a data server 30 .

The user 10 means a user terminal such as a PC, a mobile phone, a tablet, etc., and is used as a console for image search.

The trust organization 20 means a server of an organization that obtains trust from the parties in the user authentication, non-repudiation prevention, key management, etc. and performs arbitration, authentication, certification, management, etc. In the embodiments of the present invention, And may be a separate system that is physically separated or may be implemented as a user terminal.

The data server 30 is a storage device that stores encrypted images. The encryption / decryption process or the encryption / decryption technique can employ various techniques to suit a given situation to those skilled in the art of encryption technology. And the concrete implementation method thereof is omitted because it may obscure the core of the present invention. The data server 30 also stores an index of feature information of an image to be used in the encrypted search system.

First, in STEP 1, a search query is received from the user 10 and transferred to the data server 30. The search query is specially processed for the encrypted image search, and the trap door is used based on the feature information of the image to be searched. The structure of the more specific search query frame will be described later with reference to FIG. Then, in STEP 2, the data server 30 returns the encrypted image and the local binary pattern to the trust authority 20 as a response to the search query. The trust authority 20 verifies the integrity of the image by comparing the local binary pattern stored in the user 10 with the local binary pattern received from the data server 30 via STEP 3, 4 returns the integrity verification result and the image. As described above, through the image retrieval system shown in FIG. 1, the embodiments of the present invention simultaneously perform the integrity verification and the retrieval of the encrypted image.

FIG. 2 is a flowchart illustrating an image storing method for an encrypted image search according to an embodiment of the present invention, which includes the following steps.

In step S210, the image retrieval system sets at least one region of interest (ROI) in the image to be stored therein.

As mentioned above, when the integrity verification is performed on the entire image area to be stored, there is a possibility that the system load is increased due to the increasing image size. Therefore, the embodiments of the present invention perform integrity verification only for some area specified in the image, that is, the area of interest, rather than the entire image area. In this process, one or more specific regions in the image are set as the region of interest, and the computation load can be reduced by avoiding the integrity verification for the other portions.

In step S220, the image search system generates a local binary pattern (LBP) based on the region of interest set in step S210. Instead of using a conventional integrity verification technique or hash, a local binary pattern is generated from the pixels in the image and used for integrity verification. The concrete generation process of the local binary pattern will be described later with reference to FIG. 3 and FIG.

In step S230, the image retrieval system encrypts the image, concatenates the encrypted image with the local binary pattern, and stores it in the data server. Here, the encryption process for the image data is as follows.

In the encryption process, for example, a technique using a chaos map that can be utilized in the image data encryption process can be used. This is because images often have the same / similar information with respect to neighboring pixels. Therefore, when encryption is performed on a pixel-by-pixel basis, there is a high possibility that an image similar in character to the original image is output. In this case, since a cryptographic load is generated in the case of a CBC having a chained mode, it is preferable that a chaos map-based encryption process developed for image data or a corresponding encryption technique is utilized.

In step S240, the image retrieval system extracts the feature information of the ROI set in step S210, extends the feature information within the similarity range based on the feature information, and transforms the feature information into a keyword of a character string type. Then, the image retrieval system creates an index for image retrieval using the modified keyword, and stores the generated index in the data server. The stored index will be used in the image search query and integrity verification process of the users.

FIG. 3 is a view for explaining an image processing procedure for integrity verification in the image storing method of FIG. 2 according to an embodiment of the present invention.

Generally, a local binary pattern is a descriptor that is often used to express the texture of an image. The local binary pattern compares its own pixel with neighboring pixels using a pixel structure that can be expressed by a matrix of a lattice structure, (For example, it can be set to 1 in case of a positive number and set to 0 in case of a negative number), the bit stream for the bit stream is converted into a decimal number .

In summary, the local binary pattern according to an exemplary embodiment of the present invention is a local binary pattern, in which each pixel constituting the set region of interest has a pixel value of one pixel surrounding the neighboring pixels surrounding the pixel And converting the peripheral pixels into a binary pattern based on the calculated pixel value difference.

However, in the case of local binary patterns or other techniques for integrity verification, a similar value may be measured. The reason for this is that in the case of an integrity verification method based on interaction with surrounding pixels, a larger or smaller value of 1 or 0 is given in comparison with the reference value, because the binary value to be given is affected by neighboring pixels, Other integrity information is likely to output the same / similar information because of the nature of information reduction.

Accordingly, in the embodiments of the present invention, the entire process of generating a local binary pattern may include: (1) simply generating a conventional local binary pattern or storing other integrity information; and (2) performing an additional operation according to a security level . The following section provides an overview of a series of security-enhanced operations.

First, before generating the abbreviated message value, an XOR operation may be performed using a predictable random number function and generating junk data (e.g., utilizing a chaos map). In this process, since the random number value is generated by the user, malicious users can not grasp it, and it is possible to prevent guessing of a similar value for neighboring pixels. After the above process is performed, the generated data may undergo a permutation process. In this series of operations, the order of each individual operation can be arbitrarily modified by the user.

The process of generating local binary patterns for integrity and processing of other integrity information and storing are as shown in FIG. More specifically, the step of generating a local binary pattern may include generating a junk data 340 as much as the image region corresponding to the region of interest 330 using the random number function, Performing an exclusive OR operation on the junk data 340 and performing permutation 350 on the exclusive OR operation data. The local binary pattern 360 may then be generated based on the permutated data 350.

Separately, an encrypted image 320 is generated from the original image 310 according to a predetermined rule, and is concatenated with the generated local binary pattern 360 and stored in the data server 30. That is, if the local binary pattern generation process is performed only for the ROI as shown in FIG. 3, the storage space required for the integrity verification can be saved, and efficient resource management is possible.

4 is a diagram for explaining a process of setting a region of interest in an image in an image storing method according to an embodiment of the present invention, wherein the region of interest is a region in which a change in pixel value in the image region is determined to be equal to or greater than a threshold value Or an area input by the user.

For example, after detecting a change in a pixel value within an entire image area using an automated image processing technique, an area determined to be equal to or greater than a preset threshold value is regarded as an important part in the image, . Alternatively, a region of interest may be set by the user's input while the user is initially confirming the displayed image directly on the display device. At least one such area of interest may be set, and a plurality of settings may be possible as needed. Embodiments of the present invention can avoid the integrity verification of unnecessary image areas through the setting of the area of interest, thereby reducing the computation load.

5 is an example of a pseudo code that implements a function of processing coordinates of a region of interest set in an image in an image storing method according to an embodiment of the present invention.

Referring to FIG. 5, a function of receiving coordinates of a region of interest designated by a user is illustrated. This function is designed to verify / guarantee the integrity of the area of interest specified by the user upon request of the image data. For example, in verifying integrity using a local binary pattern, the pseudo code of FIG. 5 is a function of extracting a region of interest and can be utilized to store the coordinates of the region of interest.

The feature information of the ROI may include coordinate information (relative coordinates or absolute coordinates may be utilized) for an edge or a corner of the ROI and color information (color information or color depth of each position, etc.) May be utilized).

In particular, the encrypted image stored in the data server is added to the local binary pattern for the region of interest, so that when an image search query is received from the user (or may be a trusted authority) The integrity verification is performed only for the region of interest.

FIG. 6 is a diagram for explaining a process of generating a local binary pattern in the image storing method according to an embodiment of the present invention. The basic calculation method of the local binary pattern has been described above.

Referring to [A] in Fig. 6, pixel values of surrounding pixels surrounding the center pixel value are illustrated. Now, in [B], the difference between the central pixel value and the surrounding pixel value is calculated, and then in [C], a binary code is generated based on the sign of the calculated difference value. For example, if the calculated difference value is a negative number, a binary number 0 is assigned, and if the calculated difference value is a positive number, a binary number 1 is assigned.

Such an operation can be performed according to the following equations (1) and (2).

Figure 112014041553120-pat00001

Here, p represents the pixel value of the surrounding pixel, and c represents the pixel value of the central pixel.

Figure 112014041553120-pat00002

Equation (2) represents a process in which the difference value of pixel values is converted into a binary number.

Figure 112014041553120-pat00003

Equation (3) shows a method of converting a bit stream from a final binary pattern to a decimal number based on the pixel values illustrated in FIG.

FIG. 7 is a flowchart illustrating a method of retrieving an encrypted image in an image retrieval system according to another embodiment of the present invention. In the case where image data is stored based on the image storing method of FIG. 2 described above, And searching for an image.

As already pointed out, in the case of image data, it is possible to search through the index for related keywords. However, if such an index is used, there is a fear that the index information is exposed by a malicious user. If the index information is exposed, Since information can be guessed, many security problems can arise.

Therefore, in the embodiment of the present invention proposed below, a method of retrieving an encrypted image through a trap door generated using image feature information instead of image related keyword index information is presented. For example, the trap door can be created by using a hash function h of r (r is a natural number) from the private key used for encryption. When the feature information is assumed to be the keyword w converted into the string format as shown in FIG. 8 9, which will be able to identify the indexed information from the r y values generated using an identifiable identifier (eg filename) D id of the image in the server. This makes it possible to hide legitimate search queries from malicious users. Each process is described as follows.

In step S710, the data server pre-stores the encrypted binary image and the generated local binary pattern based on the region of interest in the image. That is, this process describes the final result of the image storing process of FIG. 2 described above.

Here, the local binary pattern may be calculated by calculating a difference between pixel values of neighboring pixels surrounding a corresponding pixel with respect to each pixel constituting a region of interest set in the image, And converting the peripheral pixels into a binary pattern based on the difference of the values.

In particular, the encrypted image stored in the data server is added with the local binary pattern for the region of interest, and if the image search query is received, integrity verification is performed only on the region of interest, not the entire image region .

In step S720, the data server extracts the feature information of the ROI, and stores the index of the extracted keyword within the similarity range of the feature information for each image. More specifically, a user (or an automated interest region extracting means) extracts feature information of a region of interest, generates an index in a form that does not reveal the feature information, and stores the index in the data server, Use it for inquiries.

In step S730, the data server receives an image search query using a trapdoor from a user.

In step S740, the data server reads an encrypted image corresponding to the feature information of the region of interest and a local binary pattern concatenated thereto by searching the index through the trap door received as a query.

In step S750, the data server provides a trusted third party (TTP) with the encrypted image and the local binary pattern read out in step S740, thereby allowing the trusted authority to encrypt the encrypted binary image based on the local binary pattern Inspect the integrity of the entire image.

8 is a diagram illustrating a query frame structure for an encrypted image search in the image search method according to another embodiment of the present invention.

There are various techniques for extracting features of image data, for example, a technique such as Harris Corner Detection can be used, and information obtained from image data such as color information and color depth can be used have. That is, the feature information of the ROI includes coordinate information and color information for the edge or corner of the ROI, and the image search query received by the data server is formed as a search frame combining the feature information of the ROI, It is preferable to conceal information about the user.

In this case, such feature information may be transmitted by generating a trap door from a keyword converted into a series of string form as illustrated in FIG. 8, instead of using each index information, The search query may be processed into an encrypted query using a nonce. The reason for this process is to prevent malicious users from guessing legitimate users' search queries when transmitting the same information.

According to embodiments of the present invention described above, integrity checking using a local binary pattern is performed only for a region of interest, not the entire image region, thereby saving resources required for an operation and reducing overhead, It is possible to perform fast searching in a state where the image is encrypted through the local binary pattern stored in conjunction with the image data, and to complete the integrity verification at the same time as returning the image search result.

Meanwhile, the embodiments of the present invention can be embodied as computer readable codes on a computer readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.

Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device and the like, and also a carrier wave (for example, transmission via the Internet) . In addition, the computer-readable recording medium may be distributed over network-connected computer systems so that computer readable codes can be stored and executed in a distributed manner. In addition, functional programs, codes, and code segments for implementing the present invention can be easily deduced by programmers skilled in the art to which the present invention belongs.

The present invention has been described above with reference to various embodiments. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the disclosed embodiments should be considered in an illustrative rather than a restrictive sense. The scope of the present invention is defined by the appended claims rather than by the foregoing description, and all differences within the scope of equivalents thereof should be construed as being included in the present invention.

10: User
20: Trust institutions
30: Data server
310: Original image 320: Encrypted image
330: Interest area 340: Junk data
350: permutation data 360: local binary pattern data

Claims (13)

1. An image storage method for encrypted image retrieval,
Setting at least one region of interest (ROI) in an image to be stored by the image search system;
The image search system generating a local binary pattern (LBP) based on the set region of interest;
Encrypting the image, concatenating the encrypted image with the local binary pattern and storing the concatenated image in a data server; And
Wherein the image search system extracts feature information of the set region of interest and generates an index for image search and stores the generated index in the data server.
The method according to claim 1,
Wherein generating the local binary pattern comprises:
Calculating a difference between pixel values of neighboring pixels surrounding the pixel based on one pixel with respect to each pixel constituting the set region of interest, And converting the pixels into a binary pattern.
The method according to claim 1,
Wherein generating the local binary pattern comprises:
Generating junk data of an image area corresponding to the area of interest using a random number function;
Performing an XOR operation on the set region of interest and the junk data; And
And performing permutation on the exclusive-OR computed data,
And generating a local binary pattern based on the permutated data.
The method according to claim 1,
Characterized in that the feature information of the region of interest
And coordinate information and color information for an edge or a corner of the ROI.
The method according to claim 1,
Wherein the encrypted image stored in the data server comprises:
Wherein the local binary pattern for the region of interest is added to perform integrity verification only for the region of interest rather than the entire image region when an image search query is received.
The method according to claim 1,
Wherein the region of interest comprises:
Wherein the change of the pixel value in the image region is an area determined to be equal to or higher than a threshold or an area input by a user.
A computer-readable recording medium storing a program for causing a computer to execute the method according to any one of claims 1 to 6.
A method for retrieving an encrypted image in an image retrieval system,
Concatenating and storing the local binary pattern and the encrypted image generated based on the region of interest in the image by the data server;
Extracting feature information of the ROI from the data server and storing an index of a keyword derived within a similarity range of the feature information for each image;
The data server receiving an image search query from a user using a trapdoor;
The data server reading the local binary pattern associated with the encrypted image corresponding to the feature information of the ROI using the trap door; And
The data server provides a trusted third party (TTP) with the read encrypted image and a local binary pattern to cause the trusted authority to check the integrity of the entire encrypted image based on the local binary pattern The method comprising the steps of:
9. The method of claim 8,
Wherein the local binary pattern comprises:
Calculating a difference between pixel values of neighboring pixels surrounding the pixel based on one pixel with respect to each of pixels constituting the region of interest set in the image, and calculating, based on the calculated pixel value difference, Into binary patterns. ≪ Desc / Clms Page number 20 >
9. The method of claim 8,
Wherein the feature information of the ROI includes coordinate information and color information for edges or corners of the ROI,
Wherein the image search query is formed as a search frame that combines the feature information of the ROI and is searched through the trap door when searching to conceal information about the search target.
11. The method of claim 10,
The image search query includes:
Wherein the query is an encrypted query using a nonce.
9. The method of claim 8,
Wherein the encrypted image stored in the data server comprises:
Wherein the local binary pattern for the region of interest is added such that when the image search query is received, integrity verification is performed only for the region of interest, not the entire image region.
A computer-readable recording medium storing a program for causing a computer to execute the method according to any one of claims 8 to 12.
KR1020140052402A 2014-04-30 2014-04-30 Method for storing encrypted image and searching the image KR101444828B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140052402A KR101444828B1 (en) 2014-04-30 2014-04-30 Method for storing encrypted image and searching the image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140052402A KR101444828B1 (en) 2014-04-30 2014-04-30 Method for storing encrypted image and searching the image

Publications (1)

Publication Number Publication Date
KR101444828B1 true KR101444828B1 (en) 2014-09-26

Family

ID=51761215

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140052402A KR101444828B1 (en) 2014-04-30 2014-04-30 Method for storing encrypted image and searching the image

Country Status (1)

Country Link
KR (1) KR101444828B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107209837A (en) * 2015-01-29 2017-09-26 高通股份有限公司 The block-based integrity protection technique of selectivity
KR20180075796A (en) * 2016-12-27 2018-07-05 홍익대학교 산학협력단 System and Method of Energy efficient Image Encryption using Approximation based Hardware Memoization

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050116963A (en) * 2004-06-09 2005-12-14 학교법인 영남학원 Method for image retrieval using spatial relationships and annotation
KR20070026930A (en) * 2005-08-29 2007-03-09 주식회사 비에스텍 Encryption device having an image encryption function with searching of the image and encryption and searching method of the encryption image
KR100904916B1 (en) 2008-06-19 2009-07-01 주식회사 다우엑실리콘 System and method for recognition of face
US20130308855A1 (en) * 2011-04-11 2013-11-21 Jianguo Li Smile Detection Techniques

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050116963A (en) * 2004-06-09 2005-12-14 학교법인 영남학원 Method for image retrieval using spatial relationships and annotation
KR20070026930A (en) * 2005-08-29 2007-03-09 주식회사 비에스텍 Encryption device having an image encryption function with searching of the image and encryption and searching method of the encryption image
KR100904916B1 (en) 2008-06-19 2009-07-01 주식회사 다우엑실리콘 System and method for recognition of face
US20130308855A1 (en) * 2011-04-11 2013-11-21 Jianguo Li Smile Detection Techniques

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107209837A (en) * 2015-01-29 2017-09-26 高通股份有限公司 The block-based integrity protection technique of selectivity
KR20180075796A (en) * 2016-12-27 2018-07-05 홍익대학교 산학협력단 System and Method of Energy efficient Image Encryption using Approximation based Hardware Memoization
KR101952246B1 (en) 2016-12-27 2019-02-26 홍익대학교 산학협력단 System and Method of Energy efficient Image Encryption using Approximation based Hardware Memoization

Similar Documents

Publication Publication Date Title
US9411972B2 (en) System and method for creating and protecting secrets for a plurality of groups
US10320765B2 (en) Method and system for securing communication
Xia et al. Towards privacy-preserving content-based image retrieval in cloud computing
US9536102B2 (en) Privacy-protective data transfer
Mehmood et al. Protection of big data privacy
US10275364B2 (en) Secure island computing system and method
US9331856B1 (en) Systems and methods for validating digital signatures
Wu et al. Image encryption using the two-dimensional logistic chaotic map
US9172533B2 (en) Method and system for securing communication
EP3012754B1 (en) Searchable symmetric encryption processing system
US8838977B2 (en) Watermark extraction and content screening in a networked environment
US20140298019A1 (en) Method and system for securing communication
Pouliot et al. The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption
EP2731044A2 (en) Client computer for querying a database stored on a server via a network
Bojinov et al. Kamouflage: Loss-resistant password management
Lu et al. Enabling search over encrypted multimedia databases
US8386793B2 (en) Method and apparatus for implementing electronic seal
US9892211B2 (en) Searchable code processing system and method
JP4958246B2 (en) Method, apparatus and system for fast searchable encryption
JP4622811B2 (en) Electronic document authenticity guarantee system
Halder et al. Watermarking Techniques for Relational Databases: Survey, Classification and Comparison.
Farfoura et al. A blind reversible method for watermarking relational databases based on a time-stamping protocol
KR20150141362A (en) Network node and method for operating the network node
US9003531B2 (en) Comprehensive password management arrangment facilitating security
KR101190059B1 (en) Method for data encryption and method for conjunctive keyword search of encrypted data

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
LAPS Lapse due to unpaid annual fee