A Similarity Search Scheme Over Encrypted Cloud Images Based on Secure Transformation

Download Now
Provided by: Science and Development Network (SciDev.Net)
Topic: Cloud
Format: PDF
With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a scheme for similar search on encrypted images based on a secure transformation method. The transformation on features protects the information about features, and does not degrade the result accuracy. Moreover, the image owner could update the encrypted image database as well as the secure index very easily.
Download Now

Find By Topic