Towards efficient privacy-preserving encrypted image search in cloud computing
暂无分享,去创建一个
Jian Shen | Meixia Miao | Yuan Wang | Jianfeng Wang | Y. Wang | Meixia Miao | Jian Shen | Jianfeng Wang
[1] Yan Zhang,et al. A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.
[2] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[3] Xiaofeng Chen,et al. Efficient and secure encrypted image search in mobile cloud computing , 2017, Soft Comput..
[4] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[5] Xiaofeng Chen,et al. Efficient request-based comparable encryption scheme based on sliding window method , 2016, Soft Comput..
[6] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[7] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[8] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[9] Jin Li,et al. Privacy-preserving outsourcing of image feature extraction in cloud computing , 2017, Soft Comput..
[10] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[11] Jian Sun,et al. K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[12] Derong Liu,et al. Optimization of electricity consumption in office buildings based on adaptive dynamic programming , 2017, Soft Comput..
[13] Min Wu,et al. Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.
[14] Jun Zhao,et al. Edge-Guided Dual-Modality Image Reconstruction , 2014, IEEE Access.
[15] Chengsheng Yuan,et al. Coverless Image Steganography Based on SIFT and BOF , 2017 .
[16] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[17] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[18] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[19] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[20] Fatos Xhafa,et al. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.
[21] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[23] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[24] Jianfeng Wang,et al. Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing , 2016, Soft Comput..
[25] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[26] Kai Huang,et al. Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2016, WAIM.
[27] Alan M. Frieze,et al. Min-wise independent permutations (extended abstract) , 1998, STOC '98.
[28] Shucheng Yu,et al. SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[29] Bhiksha Raj,et al. Secure Modular Hashing , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[30] Toshikazu Kato,et al. Query by Visual Example - Content based Image Retrieval , 1992, EDBT.
[31] C. Schmid,et al. Hamming Embedding and Weak Geometry Consistency for Large Scale Image Search - extended version , 2008 .
[32] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[33] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[34] Jin Wang,et al. Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .
[35] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[36] Jin Li,et al. Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , 2012, NSS.
[37] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[38] Yi Zhu,et al. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[39] Yu Bai,et al. Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.