Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications
暂无分享,去创建一个
Zifeng Xu | Fucai Zhou | Qiang Jia | Shiyue Qin | Zongye Zhang | Zifeng Xu | Fu-cai Zhou | Qiang Jia | Zongye Zhang | Shiyue Qin
[1] Yanjiao Chen,et al. InstantCryptoGram: Secure Image Retrieval Service , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[2] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Zahid Mehmood,et al. Scene analysis and search using local features and support vector machine for effective content-based image retrieval , 2018, Artificial Intelligence Review.
[4] Dan Feng,et al. A Collision-Mitigation Cuckoo Hashing Scheme for Large-Scale Storage Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.
[5] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[6] Zhe Wang,et al. Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.
[7] Kazi Wasif Ahmed,et al. Image-Centric Social Discovery Using Neural Network under Anonymity Constraint , 2017, 2017 IEEE International Conference on Cloud Engineering (IC2E).
[8] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Yun Q. Shi,et al. A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..
[11] Heng Tao Shen,et al. Hashing for Similarity Search: A Survey , 2014, ArXiv.
[12] Bogdan Warinschi,et al. Masking Fuzzy-Searchable Public Databases , 2019, IACR Cryptol. ePrint Arch..
[13] Shucheng Yu,et al. SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[14] Qiang Tang,et al. Data Is Key: Introducing the Data-Based Access Control Paradigm , 2009, DBSec.
[15] Jian Shen,et al. Towards efficient privacy-preserving encrypted image search in cloud computing , 2019, Soft Comput..
[16] Zhe Wang,et al. Modeling LSH for performance tuning , 2008, CIKM '08.
[17] Nathan Chenette,et al. Efficient Fuzzy Search on Encrypted Data , 2014, FSE.
[18] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[19] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[20] Gary R. Bradski,et al. ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.
[21] Cong Wang,et al. Towards Privacy-Preserving and Practical Image-Centric Social Discovery , 2018, IEEE Transactions on Dependable and Secure Computing.
[22] Yi Zhu,et al. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[23] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.