Content based image retrieval using deep learning process
暂无分享,去创建一个
P. Ganesh Kumar | Varghese Paul | R. Rani Saritha | V. Paul | R. Saritha | P. G. Kumar | R. Rani Saritha | P. Ganesh Kumar
[1] Armen Aghasaryan,et al. On the Use of LSH for Privacy Preserving Personalization , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Derek Hoiem,et al. Object-based image retrieval using the statistical structure of images , 2004, CVPR 2004.
[3] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[4] Patrick P. K. Chan,et al. Content-based image retrieval using color moment and Gabor texture feature , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[5] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[6] Derek Hoiem,et al. Object-based image retrieval using the statistical structure of images , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[7] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[8] Seda F. Gürses,et al. A critical review of 10 years of Privacy Technology , 2010 .
[9] Shay B. Cohen,et al. Advances in Neural Information Processing Systems 25 , 2012, NIPS 2012.
[10] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[11] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[12] Carmela Troncoso,et al. OB-PWS: Obfuscation-Based Private Web Search , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Stephen Lin,et al. Graph Embedding and Extensions: A General Framework for Dimensionality Reduction , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Shuicheng Yan,et al. Weakly-supervised hashing in kernel space , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[15] K. Srinathan,et al. An Oblivious Image Retrieval Protocol , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
[16] Patrick Pérez,et al. Reconstructing an image from its local descriptors , 2011, CVPR 2011.
[17] Zhe Wang,et al. Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.
[18] Nasir D. Memon,et al. Perceptual Audio Hashing Functions , 2005, EURASIP J. Adv. Signal Process..
[19] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.
[20] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[21] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[22] Olivier Buisson,et al. A posteriori multi-probe locality sensitive hashing , 2008, ACM Multimedia.
[23] Pedro Cano,et al. A Review of Audio Fingerprinting , 2005, J. VLSI Signal Process..
[24] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[25] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[26] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[27] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[28] Yongdong Zhang,et al. Data-oriented locality sensitive hashing , 2010, ACM Multimedia.
[29] Petros Boufounos,et al. Secure binary embeddings for privacy preserving nearest neighbors , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[30] M. Prakash,et al. Accessing the Data Efficiently using Prediction of Dynamic Data Algorithm , 2015 .
[31] Min Wu,et al. Modeling and Analysis of Correlated Binary Fingerprints for Content Identification , 2011, IEEE Transactions on Information Forensics and Security.
[32] Nicu Sebe,et al. Content-based multimedia information retrieval: State of the art and challenges , 2006, TOMCCAP.
[33] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[34] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[35] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[36] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[37] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[38] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[39] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[40] Shih-Fu Chang,et al. Submodular video hashing: a unified framework towards video pooling and indexing , 2012, ACM Multimedia.
[41] M. Prakash,et al. Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature , 2015 .
[42] Kannan Ramchandran,et al. One-Way Private Media Search on Public Databases: The Role of Signal Processing , 2013, IEEE Signal Processing Magazine.
[43] Bai Xue,et al. Research of Image Retrieval Based on Color , 2009, 2009 International Forum on Computer Science-Technology and Applications.