2013
DOI: 10.14257/ijfgcn.2013.6.6.08
|View full text |Cite
|
Sign up to set email alerts
|

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…[22] proposed an efficient privacy preserving cloud based secure image feature extraction and comparison technique. Similar construction for ranked image retrieval is proposed by [29,17,23]. These systems depend on highly capable cloud server for preforming image similarity query.…”
Section: Related Workmentioning
confidence: 99%
“…[22] proposed an efficient privacy preserving cloud based secure image feature extraction and comparison technique. Similar construction for ranked image retrieval is proposed by [29,17,23]. These systems depend on highly capable cloud server for preforming image similarity query.…”
Section: Related Workmentioning
confidence: 99%
“…Similarity search concept is considered in the following references (Xia et al, 2013), (Tsymbal et al, 2014), (Popivanov and Miller, 2002). (Xia et al, 2013) performs similarity search on encrypted images based on a secure transformation method. The transformation used does not mortify the result accuracy and also keeps the confidentiality of the data intact.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, all database update operation and query authorization relies on the database owner i.e., a single point of failure. Xia et al, [9] proposed a scheme for basic similarity search over encrypted images based on a secure transformation method that protected the information about features, and did not degrade the result accuracy. The proposed scheme protected the confidentiality of image database, feature vectors, and user's query.…”
Section: Contributionmentioning
confidence: 99%