A Similarity Search Scheme Over Encrypted Cloud Images Based on Secure Transformation

With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a scheme for similar search on encrypted images based on a secure transformation method. The transformation on features protects the information about features, and does not degrade the result accuracy. Moreover, the image owner could update the encrypted image database as well as the secure index very easily.

Provided by: Science and Development Network (SciDev.Net) Topic: Cloud Date Added: Oct 2013 Format: PDF

Find By Topic