暂无分享,去创建一个
[1] Hitoshi Kiya,et al. Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Masaaki Fujiyoshi,et al. Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[3] Thomas Sikora,et al. The MPEG-7 visual standard for content description-an overview , 2001, IEEE Trans. Circuits Syst. Video Technol..
[4] Zhihua Xia,et al. An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing , 2020, IEEE Access.
[5] João Leitão,et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.
[6] Yanyan Xu,et al. A Large-Scale Secure Image Retrieval Method in Cloud Environment , 2019, IEEE Access.
[7] Yiannis S. Boutalis,et al. CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.
[8] Hitoshi Kiya,et al. Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).
[9] Chengyuan Zhang,et al. TDHPPIR: An Efficient Deep Hashing Based Privacy-Preserving Image Retrieval Method , 2020, Neurocomputing.
[10] William Puech,et al. Recompression of JPEG Crypto-Compressed Images Without a Key , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[11] Xinpeng Zhang,et al. Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[12] Zifeng Xu,et al. Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications , 2020, IEEE Access.
[13] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[14] Hitoshi Kiya,et al. A Content-based Image Retrieval Scheme Using Compressible Encrypted Images , 2021, 2020 28th European Signal Processing Conference (EUSIPCO).
[15] Hitoshi Kiya,et al. Privacy-Preserving Deep Neural Networks with Pixel-Based Image Encryption Considering Data Augmentation in the Encrypted Domain , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[16] Hitoshi Kiya,et al. Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks , 2019, IEEE Access.
[17] David Nistér,et al. Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[18] Xinpeng Zhang,et al. AC-coefficient histogram-based retrieval for encrypted JPEG images , 2015, Multimedia Tools and Applications.
[19] Zhihua Xia,et al. BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing , 2019, IEEE Transactions on Services Computing.
[20] Hitoshi Kiya,et al. An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[21] Hitoshi Kiya,et al. An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[22] Hao Li,et al. An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing , 2019, IEEE Access.
[23] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[24] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[25] Vijay Varadharajan,et al. Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .
[26] Hitoshi Kiya,et al. Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.
[27] Yuan Yan Tang,et al. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.
[28] Hitoshi Kiya,et al. Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems , 2019, APSIPA Transactions on Signal and Information Processing.
[29] Mathias Lux,et al. Lire: lucene image retrieval: an extensible java CBIR library , 2008, ACM Multimedia.
[30] Meng Zhang,et al. Toward Efficient Encrypted Image Retrieval in Cloud Environment , 2019, IEEE Access.
[31] Xin Li,et al. CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[32] Naixue Xiong,et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..
[33] Mathias Lux,et al. Localizing global descriptors for content-based image retrieval , 2015, EURASIP Journal on Advances in Signal Processing.