2017
DOI: 10.1016/j.jvcir.2017.01.006
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving content-based image retrieval method in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 65 publications
(28 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…CBIR is widely used in many fields such as e-commerce [32], medicine [33], military, security technology [34], multimedia digital library, Geographic information System [35], architecture and engineering design [36], intellectual property [37], crime and security prevention etc. In this paper, the effectiveness of our approach is verified in e-commerce.…”
Section: Application Simulation Analysismentioning
confidence: 99%
“…CBIR is widely used in many fields such as e-commerce [32], medicine [33], military, security technology [34], multimedia digital library, Geographic information System [35], architecture and engineering design [36], intellectual property [37], crime and security prevention etc. In this paper, the effectiveness of our approach is verified in e-commerce.…”
Section: Application Simulation Analysismentioning
confidence: 99%
“…For privacy-preserving photo sharing on these services, three requirements need to be satisfied: 1) protection of visual information, 2) tolerance for recompression after encryption, and 3) identification of encrypted images. In terms of requirement 1, a lot of studies on secure and efficient communications have been reported [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. To secure multimedia data, full encryption with provable security, such as RSA and AES, is the most secure option.…”
Section: Introductionmentioning
confidence: 99%
“…To secure multimedia data, full encryption with provable security, such as RSA and AES, is the most secure option. However, most schemes do not consider requirement 2, although requirement 3 is considered in several schemes [13][14][15][16][17]. As systems that satisfy both requirements 1 and 2, Encryption-then-Compression (EtC) systems have been developed [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the fact that this paper realizes similarity search, we tend to utilize global feature (such as color, shape) instead of accurate local feature (such as SIFT, BRIEF). Hence, our integrated feature is composed of widely used HSV histogram and DCT histogram [5,21,22,24]. We focus on the construction of index tree and protection of query pattern and access pattern.…”
Section: Introductionmentioning
confidence: 99%