LSB Elimination based Feature Extraction for Outsourced Image Retrieval in Encrypted Images
暂无分享,去创建一个
[1] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[2] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Tania Oost,et al. Lest we remember , 2002 .
[4] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[5] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[6] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[7] Sharath Pankanti,et al. Fingerprint verification using SIFT features , 2008, SPIE Defense + Commercial Sensing.
[8] Debnath Bhattacharyya,et al. Secure delivery of handwritten signature , 2006, UBIQ.
[9] Gwénolé Quellec,et al. Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[10] Xinpeng Zhang,et al. Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[11] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[13] Howard Williams,et al. Lest we remember , 2001 .
[14] Thomas Schneider,et al. Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.
[15] Vitomir Struc,et al. Adaptation of SIFT Features for Robust Face Recognition , 2010, ICIAR.
[16] Chenggang Clarence Yan,et al. Triple-Bit Quantization with Asymmetric Distance for Image Content Security , 2017, Machine Vision and Applications.
[17] Jie Tian,et al. Text Clustering on National Vulnerability Database , 2010, 2010 Second International Conference on Computer Engineering and Applications.
[18] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[19] Peng Changgen,et al. Certificateless public key encryption with keyword search , 2014, China Communications.