2012 19th IEEE International Conference on Image Processing 2012
DOI: 10.1109/icip.2012.6467443
|View full text |Cite
|
Sign up to set email alerts
|

An attribute-based framework for privacy preserving image querying

Abstract: We are specifically concerned with scenarios in which multimedia data is stored once on the server and the same data is queried by multiple parties. We propose a framework for privacy preserving querying, in which encryption is performed only once, and the ciphertexts are stored on a database server. Rather than using public-key homomorphic cryptosystems, the parties querying the database first derive an "attribute" from their query signal. They can decrypt the server's ciphertext only if their attribute satis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…N σ 2 z and considering a ternary sparse encoding, we have: In order to preserve distances, given the variance of the measurement noise σ 2 z and sparsity level S x 3 , we have 3 Sparsity level Sx obtained based on the desired distortion level imposed by sparse approximation. Fig.…”
Section: E Isometric Mappingmentioning
confidence: 99%
See 2 more Smart Citations
“…N σ 2 z and considering a ternary sparse encoding, we have: In order to preserve distances, given the variance of the measurement noise σ 2 z and sparsity level S x 3 , we have 3 Sparsity level Sx obtained based on the desired distortion level imposed by sparse approximation. Fig.…”
Section: E Isometric Mappingmentioning
confidence: 99%
“…(7) Before discussion on the above inequality, we consider lower and upper bounds of distances, which we will use in Section IV. In the original signal domain, considering query vector y in the general case, the lower and upper bounds of distances between the vector x (m) , m ∈ [M ] in the database and query y can be given as N σ 2 In order to preserve distances, given the variance of the measurement noise σ 2 z and sparsity level S x 3 , we have 3 Sparsity level Sx obtained based on the desired distortion level imposed by sparse approximation. to set…”
Section: E Isometric Mappingmentioning
confidence: 99%
See 1 more Smart Citation
“…Eq. (7) was a first attempt, but the Server can do much better thanks to dus defined in (8). The idea is simple: if dus(i, j, m) is close to zero, it means that c …”
Section: Clustering the Databasementioning
confidence: 99%
“…Paper [8] builds a solution using attribute based encryption to avoid the last two drawbacks of 3.1.2. The User is able to decrypt the metadata ti if and only if it knows a vector q such that q − xi 2 ≤ τ (vectors are here elements of Z d and τ ∈ N).…”
Section: Attribute Based Encryptionmentioning
confidence: 99%