End-to-end privacy-preserving image retrieval in cloud computing via anti-perturbation attentive token-aware vision transformer

IF 14.7 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Qihua Feng , Zhixun Lu , Chaozhuo Li , Feiran Huang , Jian Weng , Philip S. Yu
{"title":"End-to-end privacy-preserving image retrieval in cloud computing via anti-perturbation attentive token-aware vision transformer","authors":"Qihua Feng ,&nbsp;Zhixun Lu ,&nbsp;Chaozhuo Li ,&nbsp;Feiran Huang ,&nbsp;Jian Weng ,&nbsp;Philip S. Yu","doi":"10.1016/j.inffus.2025.103153","DOIUrl":null,"url":null,"abstract":"<div><div>Privacy-Preserving Image Retrieval (PPIR) has gained popularity among users who upload encrypted personal images to remote servers, enabling image retrieval anytime and anywhere with privacy protection. Existing PPIR suggests extracting features from cipher-images through artificially-designed methods or Convolutional Neural Networks (CNNs). Nonetheless, manual feature engineering entails additional human effort, while CNNs are sensitive to spatial permutations as they primarily manipulate local texture features. To this end, we propose an innovative end-to-end PPIR, which not only eliminates the hassle of manual features but also enables learning expressive cipher-image representations. Specifically, since Vision Transformer (ViT) exhibits excellent robustness against permutation and occlusion in images, we elaborately design an Attentive Token-Aware (ATA) ViT model and hierarchical image block encryptions, which organically complement each other in an end-to-end system. The ATA module effectively learns informative block tokens and pays less attention to trivial and noisy encrypted blocks. Besides, to deal with the problem that the generalization of the model could be hindered by data desert, we adaptively construct the cipher-image augmentations by random block swapping and block erasing, aligning with our encryption operation. Extensive experiments on two datasets validate the superior retrieval accuracy and competitive image privacy protection performance of our proposed scheme.</div></div>","PeriodicalId":50367,"journal":{"name":"Information Fusion","volume":"121 ","pages":"Article 103153"},"PeriodicalIF":14.7000,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Fusion","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S156625352500226X","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Privacy-Preserving Image Retrieval (PPIR) has gained popularity among users who upload encrypted personal images to remote servers, enabling image retrieval anytime and anywhere with privacy protection. Existing PPIR suggests extracting features from cipher-images through artificially-designed methods or Convolutional Neural Networks (CNNs). Nonetheless, manual feature engineering entails additional human effort, while CNNs are sensitive to spatial permutations as they primarily manipulate local texture features. To this end, we propose an innovative end-to-end PPIR, which not only eliminates the hassle of manual features but also enables learning expressive cipher-image representations. Specifically, since Vision Transformer (ViT) exhibits excellent robustness against permutation and occlusion in images, we elaborately design an Attentive Token-Aware (ATA) ViT model and hierarchical image block encryptions, which organically complement each other in an end-to-end system. The ATA module effectively learns informative block tokens and pays less attention to trivial and noisy encrypted blocks. Besides, to deal with the problem that the generalization of the model could be hindered by data desert, we adaptively construct the cipher-image augmentations by random block swapping and block erasing, aligning with our encryption operation. Extensive experiments on two datasets validate the superior retrieval accuracy and competitive image privacy protection performance of our proposed scheme.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Information Fusion
Information Fusion 工程技术-计算机:理论方法
CiteScore
33.20
自引率
4.30%
发文量
161
审稿时长
7.9 months
期刊介绍: Information Fusion serves as a central platform for showcasing advancements in multi-sensor, multi-source, multi-process information fusion, fostering collaboration among diverse disciplines driving its progress. It is the leading outlet for sharing research and development in this field, focusing on architectures, algorithms, and applications. Papers dealing with fundamental theoretical analyses as well as those demonstrating their application to real-world problems will be welcome.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信