Abstract
Privacy preserving image processing is an active area of research that focuses on ensuring security of sensitive images stored in an untrusted environment like cloud. Hu introduced the concept of moment invariants that are widely employed in pattern recognition. The moment invariants are used to represent the global shape features of an image that are insensitive to basic geometric transformations like rotation, scaling and translation. In view of this fact, this paper addresses the problem of moment invariants computation in an encrypted domain. A secure Hu’s moments computation is proposed based on a fully homomorphic encryption scheme. This method may be employed for feature extraction without revealing sensitive image information in an untrusted environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31, 469–472 (1985)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of EUROCRYPT-99, pp. 223–238. Springer, Heidelberg (1999)
Gentry, C.: A fully homomorphic encryption scheme. Ph.D thesis. Stanford University, September 2009. http://crypto.stanford.edu/craig
Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Proceedings of Eurocrypt-10. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS 2011 Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97–106 (2011)
Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Advances in Cryptology CRYPTO 2012. LNCS, vol. 7417, pp. 868–886. Springer, Heidelberg (2012)
Fan, J., Vercauteren, F.: Somewhat Practical Fully Homomorphic Encryption, Cryptology ePrint Archive, Report 2012/144 (2012). http://eprint.iacr.org/2012/144
Aslett, L.J.M., Esperan, P.M., Holmes, C.C.: A Review of Homomorphic Encryption and Software Tools for Encrypted Statistical Machine Learning, Technical Report. University of Oxford (2015)
Baby, T., Cherukuri, A.K.: On query execution over encrypted data. Secur. Commun. Netw. 8(2), 321–331 (2015)
Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 4593–4607 (2012). https://doi.org/10.1109/TIP.2012.2204272
Bai, Y., Zhuo, L., Cheng, B. and Peng, Y. F.: Surf feature extraction in encrypted domain. In: IEEE International Conference on Multimedia and Expo (2014). https://doi.org/10.1109/ICME.2014.6890170
Hu, M.: Visual pattern recognition by moment invariants. IRE Trans. Inf. Theor. IT–08, 179–187 (1962)
Huang, Z., Leng, J.: Analysis of Hu’s moment invariants on image scaling and rotation. In: 2nd International Conference on Computer Engineering and Technology, pp. 476–480 (2010). https://doi.org/10.1109/ICCET.2010.5485542
Urooj, S., Singh, S.P.: Geometric invariant feature extraction of medical images using Hu’s invariants. In: 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1560–1562 (2016)
Isnanto, R.R., Zahra, A.A., Julietta, P.: Pattern recognition on herbs leaves using region-based invariants feature extraction. In: 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, pp. 455–459 (2016). https://doi.org/10.1109/ICITACEE.2016.7892491
Zhang, Y.: Pathological brain detection based on wavelet entropy and Hu moment invariants. Bio-Med. Mater. Eng. 26, 1283–1290 (2015)
Xu, D., Li, H.: Geometric moment invariants. Pattern Recognit. 41(1), 240–249 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Preethi, G., Cherukuri, A.K. (2018). Privacy Preserving Hu’s Moments in Encrypted Domain. In: Abraham, A., Muhuri, P., Muda, A., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2017. Advances in Intelligent Systems and Computing, vol 736. Springer, Cham. https://doi.org/10.1007/978-3-319-76348-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-76348-4_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76347-7
Online ISBN: 978-3-319-76348-4
eBook Packages: EngineeringEngineering (R0)