Similarity Search towards Encrypted Images for Content - Based Image Retrieval in Cloud Computing

Kiran Bharadwaj Vedula, P. Rama Krishna

Abstract


Content-based image recovery (CBIR) applications have been quickly evolved alongside the increment in the amount, accessibility and significance of pictures in our day by day life. In any case, the wide sending of CBIR plot has been restricted by its the serious calculation and capacity prerequisite. With the rise of wise terminals, the Content-Based Image Retrieval (CBIR) strategy has pulled in much consideration from numerous zones (i.e., distributed computing, long range informal communication administrations, and so on) Albeit existing protection safeguarding CBIR plans can ensure picture security while supporting picture recovery, these plans actually have intrinsic deformities (i.e., low pursuit exactness, low hunt productivity, key spillage, and so forth) To address these difficult issues, in this paper we give a comparability Search to Encrypted Images in secure distributed computing model are utilized to improve search exactness which can improve search proficiency. At last, it is reached out to additionally forestall picture clients' pursuit data from being presented to the cloud worker. Our proper security examination demonstrates that can ensure picture protection just as key security. The security investigation and trials show the security and proficiency of the proposed conspire.

 


References


E. Bart and S. Ullman. Single-example learning of novel classes using representation by similarity. In Proc. BMVC, 2005.

Y. Cao, C. Wang, Z. Li, L. Zhang, and L. Zhang. Spatial-bag-of features. In Proc. CVPR, 2010.

B. Luo, X. Wang, and X. Tang. A world wide web based image search engine using text and image content features. In Proceedings of the SPIE Electronic Imaging, 2003.

J. Cui, F. Wen, and X. Tang, “Intent Search: Interactive on-Line Image Search Re-Ranking,†Proc. 16th ACM Int’l Conf. Multimedia, 2008.

J. Cui, F. Wen, and X. Tang, “Real Time Google and Live Image Search Re-Ranking,†Proc. 16th ACM Int’l Conf. Multimedia, 2008.

D. Lowe. Distinctive image features from scale-invariant keypoints. Int’l Journal of Computer Vision, 2004.

C. Lampert, H. Nickisch, and S. Harmeling. Learning to detect unseen object classes by between-class attribute transfer. In Proc. CVPR, 2005.

J. Philbin, M. Isard, J. Sivic, and A. Zisserman. Descriptor Learning for Efficient Retrieval. In Proc. ECCV, 2010.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â