EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
暂无分享,去创建一个
Naixue Xiong | Athanasios V. Vasilakos | Zhihua Xia | Xingming Sun | A. Vasilakos | N. Xiong | Xingming Sun | Zhihua Xia
[1] G. Hema,et al. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re Encryption Function for E-Health Clouds , 2018 .
[2] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[4] Xingming Sun,et al. Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Peijia Zheng,et al. An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.
[7] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[8] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[9] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[10] Gang Chen,et al. Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.
[11] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[12] Jianwei Yin,et al. System resource utilization analysis and prediction for cloud based applications under bursty workloads , 2014, Inf. Sci..
[13] Dickson K. W. Chiu,et al. Efficient and robust large medical image retrieval in mobile cloud computing environment , 2014, Inf. Sci..
[14] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[15] Gábor Terstyánszky,et al. Buttressing volatile desktop grids with cloud resources within a reconfigurable environment service for workflow orchestration , 2014, Journal of Cloud Computing.
[16] Kui Ren,et al. SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud , 2016, AsiaCCS.
[17] Xuemin Shen,et al. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage , 2015, IEEE Transactions on Emerging Topics in Computing.
[18] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[19] Yu Bai,et al. Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.
[20] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[21] Xinpeng Zhang,et al. Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[22] Zhihua Xia,et al. Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.
[23] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[24] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[25] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[26] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[27] J M Lewin,et al. Comparison of full-field digital mammography with screen-film mammography for cancer detection: results of 4,945 paired examinations. , 2001, Radiology.
[28] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Yuhui Zheng,et al. Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..
[30] Thierry Pun,et al. Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..
[31] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[32] Hao Wang,et al. A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.
[33] João Leitão,et al. Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties , 2014, DPM/SETOP/QASA.
[34] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[35] Min Wu,et al. Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.
[36] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[37] Yi Zhu,et al. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[38] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..
[39] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[40] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[41] Kehua Guo,et al. Combined retrieval: A convenient and precise approach for Internet image retrieval , 2016, Inf. Sci..
[42] Soo-Chang Pei,et al. Secure and robust SIFT , 2009, ACM Multimedia.
[43] Zhihua Xia,et al. Fingerprint liveness detection using gradient-based texture features , 2016, Signal, Image and Video Processing.
[44] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[45] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[46] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[47] V VasilakosAthanasios,et al. Security in cloud computing , 2015 .
[48] B. S. Manjunath,et al. Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..
[49] Zhihua Xia,et al. Attribute-based access control scheme with efficient revocation in cloud computing , 2016, China Communications.