A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
暂无分享,去创建一个
Zhihua Xia | Kui Ren | Zhan Qin | Xingming Sun | Xinhui Wang | Liangao Zhang | Xingming Sun | K. Ren | Zhihua Xia | Zhan Qin | Xinhui Wang | Liangao Zhang | Xingming Sun
[1] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[2] João Leitão,et al. Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Alessandro Piva,et al. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.
[5] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[6] Kasper Bonne Rasmussen,et al. dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation , 2014, NDSS 2014.
[7] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[8] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[10] Stefan Katzenbeisser,et al. Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks , 2008, IEEE Transactions on Information Forensics and Security.
[11] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[12] Alessandro Piva,et al. A Provably Secure Anonymous Buyer–Seller Watermarking Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[13] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[14] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[15] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[16] Xinpeng Zhang,et al. Markov Process Based Retrieval for Encrypted JPEG Images , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[17] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[18] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[19] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[20] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[21] Yi Mu,et al. Secure Image Retrieval Based on Visual Content and Watermarking Protocol , 2011, Comput. J..
[22] Peijia Zheng,et al. An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.
[23] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[24] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[25] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[26] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[27] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[28] Alessandro Piva,et al. Secure Client-Side ST-DM Watermark Embedding , 2010, IEEE Transactions on Information Forensics and Security.
[29] Yu Bai,et al. Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.
[30] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[31] Yi Zhu,et al. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[32] Zhihua Xia,et al. Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.
[33] Nasir D. Memon,et al. Protocols for Watermark Verification , 2001, IEEE Multim..
[34] Mauro Barni,et al. Managing Copyright in Open Networks , 2002, IEEE Internet Comput..
[35] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[36] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.
[37] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..
[38] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[39] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[40] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[41] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[42] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[43] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[44] Soo-Chang Pei,et al. Secure and robust SIFT , 2009, ACM Multimedia.
[45] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[46] B. S. Manjunath,et al. Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..
[47] Alessandro Neri,et al. A joint digital watermarking and encryption method , 2008, Electronic Imaging.
[48] Thierry Pun,et al. Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..
[49] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[50] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[51] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[52] Stefan Katzenbeisser,et al. Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.