Privacy Preserving Search of Multimedia
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[2] James Ze Wang,et al. Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.
[3] Andrew Zisserman,et al. Near Duplicate Image Detection: min-Hash and tf-idf Weighting , 2008, BMVC.
[4] Jeroen Doumen,et al. Using Secret Sharing for Searching in Encrypted Data , 2004, Secure Data Management.
[5] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[6] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[7] Michael Isard,et al. Object retrieval with large vocabularies and fast spatial matching , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[9] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[10] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[11] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[12] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[14] Michael A. Casey,et al. Locality-Sensitive Hashing for Finding Nearest Neighbors , 2008 .
[15] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[16] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[17] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[18] Alan M. Frieze,et al. Min-Wise Independent Permutations , 2000, J. Comput. Syst. Sci..
[19] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[20] Andrei Z. Broder,et al. On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).
[21] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Michael Isard,et al. General Theory , 1969 .
[23] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[24] Robert M. Gray,et al. Image retrieval using color histograms generated by Gauss mixture vector quantization , 2004, Comput. Vis. Image Underst..
[25] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[26] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[27] David Nistér,et al. Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[28] Min Wu,et al. Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.
[29] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[30] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[31] Kotagiri Ramamohanarao,et al. Inverted files versus signature files for text indexing , 1998, TODS.
[32] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[33] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[34] Gustavo Carneiro,et al. Supervised Learning of Semantic Classes for Image Annotation and Retrieval , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[36] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[37] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.