2012
DOI: 10.1109/tip.2012.2204272
|View full text |Cite
|
Sign up to set email alerts
|

Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT

Abstract: Abstract-Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preservin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 186 publications
(14 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…A method for security feature of SIFT is proposed in [59]. The authors proposed privacy preserving SIFT to solve the problem of feature extraction in encrypted domain.…”
Section: Measures For Security Specific To Untrusted Server and Imagementioning
confidence: 99%
See 2 more Smart Citations
“…A method for security feature of SIFT is proposed in [59]. The authors proposed privacy preserving SIFT to solve the problem of feature extraction in encrypted domain.…”
Section: Measures For Security Specific To Untrusted Server and Imagementioning
confidence: 99%
“…Distributed agent-based privacy-preserving framework Privacy preservation for Untrusted Server [56] Identity-based Encryption Security [57] Grouper framework without trusted central servers Security [58] Privacy preserving SIFT Image Feature Extraction with Privacy preservation [59] Securing SIFT Image Feature Extraction with Privacy preservation [60]…”
Section: Proposed Work Focus Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…SecSIFT [53] employed orderpreserving encryption and distributes the SIFT computation among different servers. Hsu et al [27] proposed a privacy preserving SIFT based on homomorphic encryption, while Bai et al [7] performed SURF feature extraction in encrypted domain using Paillier's homomorphic cryptosystem. Wang et al [70] improve the SURF algorithm in encrypted domain by designing protocols for secure multiplication and comparison, that employ a "somewhat" homomorphic encryption.…”
Section: Privacy Preserving Image Matchingmentioning
confidence: 99%
“…Afterward, a privacy-protection image search method that utilizes homomorphic encryption presented by Hsu et al [19]. In spite of perceiving images with high precision, this plan is two to four requests of-size more costly, and requested the standard inclusion of the client all through the searching procedure.…”
Section: Introductionmentioning
confidence: 99%