A Large-Scale Secure Image Retrieval Method in Cloud Environment
暂无分享,去创建一个
Yanyan Xu | Jiaying Gong | Xiao Zhao | Yanyan Xu | Xiao Zhao | Jiaying Gong
[1] Andrew Zisserman,et al. Near Duplicate Image Detection: min-Hash and tf-idf Weighting , 2008, BMVC.
[2] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[3] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[4] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[5] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[6] David Nistér,et al. Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[7] Zhihua Xia,et al. Secure Image LBP Feature Extraction in Cloud-Based Smart Campus , 2018, IEEE Access.
[8] Hao Li,et al. An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing , 2019, IEEE Access.
[9] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[10] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[11] Michael Isard,et al. General Theory , 1969 .
[12] Pietro Perona,et al. A Bayesian hierarchical model for learning natural scene categories , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[13] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[14] Yun Q. Shi,et al. A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..
[15] Jie Li,et al. Privacy-Preserving Emotion Detection for Crowd Management , 2014, AMT.
[16] Andrei Z. Broder,et al. On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).
[17] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Michael Isard,et al. Object retrieval with large vocabularies and fast spatial matching , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[19] Yi Zhu,et al. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[20] Min Wu,et al. Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.
[21] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[22] Zhihua Xia,et al. BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing , 2019, IEEE Transactions on Services Computing.
[23] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[24] Alan M. Frieze,et al. Min-wise independent permutations (extended abstract) , 1998, STOC '98.
[25] Wei-Ta Chu,et al. A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval , 2015, ICMR.
[26] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[27] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.