{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T07:31:31Z","timestamp":1768894291035,"version":"3.49.0"},"reference-count":42,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T00:00:00Z","timestamp":1724198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282023012"],"award-info":[{"award-number":["3282023012"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282024056"],"award-info":[{"award-number":["3282024056"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Network Security Team Construction 2024","award":["3282023012"],"award-info":[{"award-number":["3282023012"]}]},{"name":"Network Security Team Construction 2024","award":["3282024056"],"award-info":[{"award-number":["3282024056"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Preserving the privacy of the ever-increasing multimedia data on the cloud while providing accurate and fast retrieval services has become a hot topic in information security. However, existing relevant schemes still have significant room for improvement in accuracy and speed. Therefore, this paper proposes a privacy-preserving image\u2013text retrieval scheme called PITR. To enhance model performance with minimal parameter training, we freeze all parameters of a multimodal pre-trained model and incorporate trainable modules along with either a general adapter or a specialized adapter, which are used to enhance the model\u2019s ability to perform zero-shot image classification and cross-modal retrieval in general or specialized datasets, respectively. To preserve the privacy of outsourced data on the cloud and the privacy of the user\u2019s retrieval process, we employ asymmetric scalar-product-preserving encryption technology suitable for inner product calculation, and we employ distributed index storage technology and construct a two-level security model. We construct a hierarchical index structure to speed up query matching among massive high-dimensional index vectors. Experimental results demonstrate that our scheme can provide users with secure, accurate, fast cross-modal retrieval service while preserving data privacy.<\/jats:p>","DOI":"10.3390\/sym16081084","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T03:07:38Z","timestamp":1724296058000},"page":"1084","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Cross-Modal Privacy-Preserving Image\u2013Text Retrieval Scheme"],"prefix":"10.3390","volume":"16","author":[{"given":"Kejun","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"},{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9439-0394","authenticated-orcid":false,"given":"Shaofei","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Yutuo","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Yuwei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Automation and Information Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"}]},{"given":"Pengcheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Xiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Bing","family":"Zou","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Wenbin","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TCC.2017.2669999","article-title":"Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories","volume":"7","author":"Ferreira","year":"2019","journal-title":"Cloud Comput. IEEE Trans."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Liu, D., Shen, J., Xia, Z., and Sun, X. (2017). A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing. Information, 8.","DOI":"10.3390\/info8030096"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TII.2019.2913217","article-title":"A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things","volume":"16","author":"Xia","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"117508","DOI":"10.1016\/j.eswa.2022.117508","article-title":"A privacy-preserving content-based image retrieval method based on deep learning in cloud computing","volume":"203","author":"Ma","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Feng, Q., Li, P., Lu, Z., Li, C., Wang, Z., Liu, Z., Duan, C., Huang, F., Weng, J., and Yu, P.S. (2024). Evit: Privacy-preserving image retrieval via encrypted vision transformer in cloud computing. arXiv.","DOI":"10.1109\/TCSVT.2024.3370668"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhang, L., Jung, T., Feng, P., Liu, K., and Liu, Y. (2015, January 1\u20134). PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud. Proceedings of the International Conference on Parallel Processing, Beijing, China.","DOI":"10.1109\/ICPP.2015.104"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bellafqira, R., Coatrieux, G., Bouslimi, D., and Quellec, G. (2015, January 25\u201329). Content-based image retrieval in homomorphic encryption domain. Proceedings of the 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Milan, Italy.","DOI":"10.1109\/EMBC.2015.7319009"},{"key":"ref_8","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., and Wernsing, J. (2016, January 19\u201324). Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. Proceedings of the International Conference on Machine Learning, New York City, NY, USA."},{"key":"ref_9","unstructured":"Juvekar, C., Vaikuntanathan, V., and Chandrakasan, A. (2018). Gazelle: A Low Latency Framework for Secure Neural Network Inference. arXiv."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Cheng, B., Zhuo, L., Bai, Y., Peng, Y., and Zhang, J. (2014, January 3\u20135). Secure index construction for privacy-preserving large-scale image retrieval. Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, Sydney, NSW, Australia.","DOI":"10.1109\/BDCloud.2014.36"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/TCC.2020.2989923","article-title":"Similarity search for encrypted images in secure cloud computing","volume":"10","author":"Li","year":"2020","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Huang, J., Luo, Y., Xu, M., Fu, S., and Huang, K. (2022, January 5\u20138). Accelerating privacy-preserving image retrieval with multi-index hashing. Proceedings of the 2022 IEEE\/ACM 7th Symposium on Edge Computing (SEC), Seattle, WA, USA.","DOI":"10.1109\/SEC54971.2022.00075"},{"key":"ref_13","unstructured":"Li, J., Li, D., Savarese, S., and Hoi, S. (2023, January 23\u201329). Blip-2: Bootstrapping language-image pre-training with frozen image encoders and large language models. Proceedings of the International Conference on Machine Learning, Honolulu, HI, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TDSC.2019.2894411","article-title":"Searchable symmetric encryption with forward search privacy","volume":"18","author":"Li","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wang, B., Song, W., Lou, W., and Hou, Y.T. (May, January 26). Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong.","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Wang, B., Hou, Y., Li, M., Wang, H., and Li, H. (2014, January 4\u20136). Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan.","DOI":"10.1145\/2590296.2590305"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jcss.2021.12.004","article-title":"A secure searchable encryption scheme for cloud using hash-based indexing","volume":"126","author":"Andola","year":"2022","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.jvcir.2019.03.021","article-title":"Huffman-code based retrieval for encrypted JPEG images","volume":"61","author":"Liang","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/TSC.2019.2927215","article-title":"BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing","volume":"15","author":"Xia","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","article-title":"Survey on fully homomorphic encryption, theory, and applications","volume":"110","author":"Marcolla","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_21","first-page":"1354","article-title":"Towards private and scalable cross-media retrieval","volume":"18","author":"Hu","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.1007\/s11063-021-10447-4","article-title":"DAP 2 CMH: Deep adversarial privacy-preserving cross-modal hashing","volume":"54","author":"Zhu","year":"2022","journal-title":"Neural Process. Lett."},{"key":"ref_23","first-page":"103440","article-title":"A privacy-preserving cross-media retrieval on encrypted data in cloud computing","volume":"73","author":"Wang","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_24","unstructured":"Radford, A., Kim, J.W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., Sastry, G., Askell, A., Mishkin, P., and Clark, J. (2021, January 18\u201324). Learning transferable visual models from natural language supervision. Proceedings of the International Conference on Machine Learning, Online."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/TPAMI.2018.2889473","article-title":"Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs","volume":"42","author":"Malkov","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_26","first-page":"305","article-title":"Secure search service based on word2vec in the public cloud","volume":"18","author":"Liu","year":"2019","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wang, Y., Sun, X., and Zhang, X. (2022). Semantic and secure search over encrypted outsourcing cloud based on BERT. Front. Comput. Sci., 16.","DOI":"10.1007\/s11704-021-0277-0"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1137\/1035134","article-title":"On the early history of the singular value decomposition","volume":"35","author":"Stewart","year":"1993","journal-title":"SIAM Rev."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"e2246","DOI":"10.1002\/nla.2246","article-title":"Fast approximate truncated SVD","volume":"26","author":"Shishkin","year":"2019","journal-title":"Numer. Linear Algebra Appl."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.l., Kao, B., and Mamoulis, N. (July, January 29). Secure kNN computation on encrypted databases. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, Providence, RI, USA.","DOI":"10.1145\/1559845.1559862"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Lei, X., Tu, G.H., Liu, A.X., and Xie, T. (July, January 29). Fast and secure knn query processing in cloud computing. Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France.","DOI":"10.1109\/CNS48642.2020.9162307"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_33","unstructured":"Yang, A., Pan, J., Lin, J., Men, R., Zhang, Y., Zhou, J., and Zhou, C. (2022). Chinese clip: Contrastive vision-language pretraining in chinese. arXiv."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Liu, X., Zheng, Y., Du, Z., Ding, M., Qian, Y., Yang, Z., and Tang, J. (2023). GPT understands, too. arXiv.","DOI":"10.1016\/j.aiopen.2023.08.012"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lester, B., Al-Rfou, R., and Constant, N. (2021). The power of scale for parameter-efficient prompt tuning. arXiv.","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1162\/neco_a_01199","article-title":"A review of recurrent neural networks: LSTM cells and network architectures","volume":"31","author":"Yu","year":"2019","journal-title":"Neural Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ceh.2020.11.002","article-title":"An anatomization on breast cancer detection and diagnosis employing multi-layer perceptron neural network (MLP) and Convolutional neural network (CNN)","volume":"4","author":"Desai","year":"2021","journal-title":"Clin. eHealth"},{"key":"ref_38","first-page":"1950","article-title":"Few-shot parameter-efficient fine-tuning is better and cheaper than in-context learning","volume":"35","author":"Liu","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","article-title":"Principal component analysis","volume":"2","author":"Abdi","year":"2010","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"100378","DOI":"10.1016\/j.cosrev.2021.100378","article-title":"Conceptual and empirical comparison of dimensionality reduction algorithms (pca, kpca, lda, mds, svd, lle, isomap, le, ica, t-sne)","volume":"40","author":"Anowar","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.jcss.2014.11.016","article-title":"SVD-based incremental approaches for recommender systems","volume":"81","author":"Zhou","year":"2015","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_42","unstructured":"Zhang, K., Xu, S., Li, P., Zhang, D., Wang, W., and Zou, B. CRE: An Efficient Ciphertext Retrieval Scheme Based on Encoder. Proceedings of the International Conference on Neural Information Processing."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/1084\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:40:14Z","timestamp":1760110814000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/1084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,21]]},"references-count":42,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["sym16081084"],"URL":"https:\/\/doi.org\/10.3390\/sym16081084","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,21]]}}}