Encrypted Video Search with Single/Multiple Writers

Author:

Zheng Yu1,Zhang Wenchao2,Song Wei3,Wang Xiuhua4,Fu Chong5

Affiliation:

1. Department of Information Engineering, Chinese Univ. of Hong Kong, Shatin, Hong Kong, China

2. College of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an, China

3. School of Computer Science and Engineering, Northeastern University, Shenyang, China

4. Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China

5. School of Computer Science and Engineering, Northeastern University; Engineering Research Center of Security Technology of Complex Network System, Ministry of Education, Shenyang, China

Abstract

Video-based services have become popular. Clients often outsource their videos to the cloud to relieve local maintenance. However, privacy has become a major concern since many videos contain sensitive information. Although retrieving (unencrypted) videos has been extensively investigated, retrieving encrypted multimedia has received relatively rare attention, at best in a limitation of image-based similarity searches. We initiate the study of scalable encrypted video search, enabling clients to query videos similar to an image search. Our modular framework leverages intrinsic attributes of videos, such as semantics and visuals, to effectively capture their contents. We propose a two-step approach whereby lightweight searchable encryption techniques are used for pre-screening, followed by an interactive approach for fine-grained search. Furthermore, we present three instantiations, including one centralized-writer instantiation and two distributed-writer instantiations, to effectively cater to varying needs and scenarios– 1) The centralized one employs forward and backward private searchable encryption [CCS 2017] over deep hashing [CVPR 2020]. 2) Motivated by distributed computing, the multi-writer instantiations building atop HSE [Usenix Security 2022] allows searching the relevant videos contributed by multiple intuitions collaboratively. Our experimental results illustrate their practical performance over multiple real-world datasets, whether in a centralized setting or distributed setting.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture

Reference92 articles.

1. [n. d.]. Charm-Crypto 0.50 documentation. https://jhuisi.github.io/charm/install_source.html.

2. [n. d.]. Python Cryptography Package. https://pypi.org/project/cryptography/2.1.4/.

3. [n. d.]. Python Cryptography Toolkit (pycrypto). https://pypi.org/project/pycrypto.

4. Delay-Sensitive Video Computing in the Cloud: A Survey. In ACM;Abdallah Maha;Trans. Multim. Comput. Commun. Appl.,2018

5. Audio Masking Effect on Inter-Component Skews in Olfaction-Enhanced Multimedia Presentations

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3