Secure Content Based Image Retrieval System Using Deep Learning

Authors

  • Meqdam A. Mohammed Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Mohammed A. Hussain Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Zakariya A. Oraibi Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Zaid A. Abduljabbar Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Vincent O. Nyangaresi Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo, Kenya.

DOI:

https://doi.org/10.56714/bjrs.49.2.9

Keywords:

Deep Learning, Content-Based Image Retrieval, Visual Cryptography, Advanced Encryption Standard

Abstract

This paper investigates Content-Based Image Retrieval (CBIR) using an ensemble of three cutting-edge deep learning architectures: Xception, MobileNet, and Inception. This ensemble approach demonstrated exceptional retrieval accuracy, with Xception and Inception models achieving an accuracy of 92.375%, precision and recall of 93% and 92% respectively, and an F1-score of 92%. The MobileNet model also showed strong performance, with an accuracy of 87.125%, precision and recall of 88% and 87%, and an F1-score of 87%.Beyond mere retrieval accuracy, the study places a significant emphasis on the security of the image database. A dual-layer encryption method was employed, integrating visual cryptography with the Advanced Encryption Standard (AES) to ensure robust protection of sensitive data. This approach guarantees efficient image retrieval based on content while securing the data against potential breaches.The results underscore the efficiency of the ensemble model in balancing high retrieval accuracy with stringent security measures. This balance is particularly relevant for applications in digital libraries, historical research, fingerprint identification, and crime prevention. The paper’s findings advocate for the critical need to integrate strong security protocols in future CBIR systems, ensuring optimal performance without compromising data security

Downloads

Download data is not yet available.

References

Z. A. Abduljabbar, A. Ibrahim, M. A. Hussain, Z. A. Hussien, M. A. Al Sibahee, S. Lu, KSII Transactions on Internet and Information Systems (TIIS), 13(11), 5692(2019). DOI:https://doi.org/10.3837/tiis.2019.11.023

Z. A. Abduljabbar, H. Jin, A. Ibrahim, Z. A. Hussien, S. H. Abbdal, D. Zou, In: Proceedings of the International Conference on Signal Processing, Communication, Computing ICSPCC 2016 (2016). DOI:https://doi.org/10.1109/ICSPCC.2016.7753617

Z. A. Abduljabbar, H. Jin, A. Ibrahim, Z. A. Hussien, M. A. Hussain, S. H. Abbdal, D. Zou, SEPIM: Secure and efficient private image matching. Applied Sciences 6(8), 133(2016). DOI:https://doi.org/10.3390/app6080213

M. A. Al Sibahee, A. I. Abdulsada, Z. A. Abduljabbar, J. Ma, V. O. Nyangaresi, S. M. Umran, Applied Sciences 11(24), 12040(2021). DOI:https://doi.org/10.3390/app112412040

M. A. Al Sibahee, S. Lu, Z. Ameen Abduljabbar, A. Ibrahim, Z. A. Hussien, K. A. Mutlaq, M. A. Hussain, Efficient encrypted image retrieval in IoT-cloud with multi-user authentication, International Journal of Distributed Sensor Networks 14(2), 5692( 2018) DOI:https://doi.org/10.1177/1550147718761814

M. A. Hussain, Z. A. Hussien, Z. A. Abduljabbar, J. Ma J, M. A. Al Sibahee, S. A. Hussain, V. O. Nyangaresi, X. Jiao, Egyptian Informatics Journal 23(4), 145(2022). DOI:https://doi.org/10.1016/j.eij.2022.10.001

F. Valente, A. Silva, C. Costa, Current Medical Imaging 9(4), 250(2013). DOI:https://doi.org/10.2174/15734056091310281214

F. Liu, et al., IEEE Access 7, 119209(2019). DOI:https://doi.org/10.1109/ACCESS.2019.2935222

L. Zhang, et al., Neural Computing and Applications, 1949(2020). DOI:https://doi.org/10.1007/s00521-019-04491-4

X. Li, J. Yang, J. Ma, Neurocomputing 452, 675 (2021). DOI:https://doi.org/10.1016/j.neucom.2020.07.139

Heron, Network Security.12, 8(2009). DOI:https://doi.org/10.1016/S1353-4858(10)70006-4

Z. Xia, L. Wang, J. Tang, N. Xiong, J. Weng, IEEE Transactions on Network Science and Engineering 8(1), 318(2020). DOI:https://doi.org/10.1109/TNSE.2020.3038218

M.J. Awan, O.A. Masood, M.A. Mohammed, A. Yasin, A.M. Zain et al., Electronics 10(19), 2444 (2021). DOI:https://doi.org/10.3390/electronics10192444

J. Qin, J. Chen, X. Xiang, Y. Tan, W. Ma et al., Journal of Real-Time Image Processing 17(1), 161(2020). DOI:https://doi.org/10.1007/s11554-019-00909-3

W. Ma, J. Qin, X. Xiang, Y. Tan, Z. He, Mathematics 8(6), 1019 (2020). DOI:https://doi.org/10.3390/math8061019

J. Tang, Z. Xia, L. Wang, C. Yuan, X. Zhao, Journal on Big Data 3(1), 21(2021). DOI:https://doi.org/10.32604/jbd.2021.015892

Y. Xu, J. Gong, L. Xiong, Z. Xu, J. Wang, Journal of Visual Communication and Image Representation 43(2), 164(2017). DOI:https://doi.org/10.1016/j.jvcir.2017.01.006

D. Liu, J. Shen, Z. Xia, X. Sun, Information-an International Interdisciplinary Journal 8(3), 96(2017). DOI:https://doi.org/10.3390/info8030096

Y. Wu, L. Zhang, S. Berrettiv, S. Wan, IEEE Transactions on Industrial Informatics 19(2), 2089-2098 (2022). DOI:https://doi.org/10.1109/TNSE.2022.3151502

J. Anju, R. Shreelekshmi, Expert Systems with Applications 189, 1(2022). DOI:https://doi.org/10.1016/j.eswa.2021.116070

H. Cheng, H. Wang, X. Liu, Y. Fang, M. Wang et al., IEEE Transactions on Dependable and Secure Computing 18(3), 1456(2019). DOI:https://doi.org/10.1109/TDSC.2019.2923653

Y. Li, J. Ma, Y. Miao, Y. Wang, X. Liu et al., IEEE Transactions on Cloud Computing 10(2), 1142(2020). DOI: https://doi.org/10.1109/TCC.2020.2989923

L. Weng, L. Amsaleg, T. Furon, IEEE Transactions on Knowledge and Data Engineering 28(10), 2738(2016). DOI: https://doi.org/10.1109/TKDE.2016.2587258

X. Wang, J. Ma, Y. Miao, Journal of Communications (Chinese) 40(2), 31-39 (2019). DOI:https://doi.org/10.1109/TDSC.2019.2897675

A. Hassan, F. Liu, F. Wang, Y. Wang, Journal of Systems Architecture 116, 1(2021). DOI:https://doi.org/10.1016/j.sysarc.2021.102043

B. Baliga, R. Medepalli, S. Muralikrishna, International Journal of Information Technology 13(3), 1111(2021). DOI:https://doi.org/10.1007/s41870-020-00582-x

A. Du, L. Wang, S. Cheng, N. Ao, Symmetry 12(2), 282 (2020). DOI:https://doi.org/10.3390/sym12020282

C. Zhang, L. Zhu, S. Zhang, W. Yu, Neurocomputing 406(1), 386(2020). DOI:https://doi.org/10.1016/j.neucom.2019.11.119

Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, IEEE Transactions on Information Forensics and Security 11(11), 2594(2016). DOI:https://doi.org/10.1109/TIFS.2016.2590944

Y. Wu, H. Guo, C. Chakraborty, M. Khosravi, S. Berretti et al., IEEE Transactions on Network Science and Engineering 10(5), 3086 (2022). DOI:https://doi.org/10.1109/TNSE.2022.3151502

Z. Xia, Y. Zhu, X. Sun, Z. Qin, K. Ren, IEEE Transactions on Cloud Computing 6(1), 276(2015). DOI:https://doi.org/10.1109/TCC.2015.2491933

Secure Content Based Image Retrieval System Using Deep Learning

Downloads

Published

30-12-2023

How to Cite

A. Mohammed, M., A. Hussain, M., A. Oraibi, Z., A. Abduljabbar, Z., & O. Nyangaresi, V. (2023). Secure Content Based Image Retrieval System Using Deep Learning. Basrah Researches Sciences, 49(2), 94–111. https://doi.org/10.56714/bjrs.49.2.9

Issue

Section

Articles