Feature Extraction using SIFT for Privacy Preserving Over Encrypted Image

Authors(2) :-Pranjali M Marne, Prof. P. M. Kamde

In past a huge number of the data owners stores their individual multimedia information so for the communication to be carried out securely, the private information shouldn’t be reveal by its originated application of the owners as it does outsourced multimedia. Thus it is important to maintain the privacy by preserving the computation in outsource multimedia data. Thus the privacy-preservation will be implemented using SIFT (Scale Invariant Feature Transform) algorithm over the image. The data set owner is responsible to have the image data set thus which is responsible to send the image to server thus the feature extraction is done by using SIFT. The Batched Secure Multiplication Protocol for the communication between the servers and Batched Secure Comparison protocol for the comparison. It uses somewhat holomorphic encryption technique. TheCaltech256 standard dataset is used and the application users will have high level of security on image data.

Authors and Affiliations

Pranjali M Marne
Department of Computer Engineering, Sinhgad College of Engineering, Savitribai Phule, Pune University, Pune, Maharashtra, India
Prof. P. M. Kamde
Department of Computer Engineering, Sinhgad College of Engineering, Pune, Savitribai Phule, Pune University, Pune, Maharashtra, India

SIFT, Encryption, Feature Selection, Secure Data Outsourcing.

  1. QWang, S. Hu, J.Wang, Z.Wang, K. Ren, and M. Du "Computation of Feature Extractions Over Encrypted Image Data" 2016.
  2. S Hu, Q. Wang, J. Wang, Z. Qin and K. Ren "Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data" 2016.
  3. J Zhou, Z. Cao, X. Dong and X. Lin "PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems" 2015.
  4. Z Xia, X. Wang, L. Zhang, Z. Qin, X. Sun and K. Ren "A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing" 2016.
  5. X Ding, T. Jung, C. Liu, X. Y. Li , L. Zhang, and Y. Liu, "POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices" 2015 .
  6. XWang, Q.Wang, X. Sun, Z. Xia, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data" 2015.
  7. S-C. Pei and C.-S. Lu, "Image feature extraction in encrypted domain with privacy-preserving sift 2012.
  8. L Amsaleg, Weng, A. Morton, and S. Marchand Maillet, "Aprivacy preserving framework for large-scale content-based information retrieval" 2015.
  9. -Y. Hsu, C.-S. Lu, and S.-C. Pei "Image feature extraction in encrypted domain with privacy-preserving sift" 2012.
  10. Y. Huang, D. Evans, J. Katz, and L. Malka "Faster secure two-party computation using garbled circuits 2011.
  11. M J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations" 2010.

Publication Details

Published in : Volume 4 | Issue 8 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 664-669
Manuscript Number : IJSRSET1184472
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Pranjali M Marne, Prof. P. M. Kamde, " Feature Extraction using SIFT for Privacy Preserving Over Encrypted Image, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.664-669, May-June-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1184472

Article Preview