A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
暂无分享,去创建一个
[1] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Rainer Lienhart,et al. An extended set of Haar-like features for rapid object detection , 2002, Proceedings. International Conference on Image Processing.
[3] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[4] Yiannis S. Boutalis,et al. Accurate Image Retrieval Based on Compact Composite Descriptors and Relevance Feedback Information , 2010, Int. J. Pattern Recognit. Artif. Intell..
[5] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[6] David A. Shamma,et al. The New Data and New Challenges in Multimedia Research , 2015, ArXiv.
[7] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[8] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[10] Hugo Krawczyk,et al. Rich Queries on Encrypted Data: Beyond Exact Matches , 2015, ESORICS.
[11] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[12] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[13] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[14] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[15] Mathias Lux,et al. Img(Rummager): An Interactive Content Based Image Retrieval System , 2009, 2009 Second International Workshop on Similarity Search and Applications.
[16] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[17] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[18] Mathias Lux,et al. Lire: lucene image retrieval: an extensible java CBIR library , 2008, ACM Multimedia.
[19] J. Steindl. The Pareto Distribution , 1990 .
[20] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[21] Sei-ichiro Kamata,et al. NIR: Content based image retrieval on cloud computing , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[22] Peter Y. A. Ryan,et al. Computer Security -- ESORICS 2015 , 2015, Lecture Notes in Computer Science.
[23] Yiannis S. Boutalis,et al. Content based radiology image retrieval using a fuzzy rule based scalable composite descriptor , 2009, Multimedia Tools and Applications.
[24] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[25] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[26] Yan Huang,et al. Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward , 2015, CCS.
[27] Muhammad Naveed,et al. The Fallacy of Composition of Oblivious RAM and Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[28] Yiannis S. Boutalis,et al. FCTH: Fuzzy Color and Texture Histogram - A Low Level Feature for Accurate Image Retrieval , 2008, 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services.
[29] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[30] Harry Wechsler,et al. The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..
[31] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[32] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[33] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[34] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[35] Yi Zhu,et al. A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation , 2013 .
[36] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.