2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2018
DOI: 10.1109/icassp.2018.8461862
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Outsourced Media Search Using Secure Sparse Ternary Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 25 publications
(33 citation statements)
references
References 10 publications
0
33
0
Order By: Relevance
“…D. Sparse Ternary Coding (STC) [10], [17] The encoder is a mapping ϕ : R N → {−1, 0, +1} L , where L may be smaller, equal to, or larger than N . The ϕ(x) is a sparse encoding of x; the number of nonzero entries is S t L, which is called the sparsity level.…”
Section: The Code Offset Methods [1] [16]mentioning
confidence: 99%
See 1 more Smart Citation
“…D. Sparse Ternary Coding (STC) [10], [17] The encoder is a mapping ϕ : R N → {−1, 0, +1} L , where L may be smaller, equal to, or larger than N . The ϕ(x) is a sparse encoding of x; the number of nonzero entries is S t L, which is called the sparsity level.…”
Section: The Code Offset Methods [1] [16]mentioning
confidence: 99%
“…G. Sparse Coding with Amibiguation (SCA) [9], [10] Given a sparse ternary vector v = ϕ(x) ∈ {−1, 0, 1} L , the ambiguation mechanism A turns S n randomly chosen zero components of v into a (random) ±1. The resulting ternary vector u = A(v) is stored as enrolment data (see Fig.…”
Section: E Sparse Binary Coding (Sbc)mentioning
confidence: 99%
“…This work follows the learning-based approach, however, instead of the usual binary representations used in these methods, we focus on sparsity of representations similarly to [18]. This allows us to benefit from the SCA framework [11,19] for ambiguation.…”
Section: Introductionmentioning
confidence: 99%
“…We do not pretend to be exhaustive in our overview and refer interesting readers to [8]. Recently, a concept of the STCA was proposed that combines and extends the encoding and randomization principles from the informationtheoretic perspectives [9][10][11]. The STCA ensures the protection of both templates and queries in authentication and identification systems against the adversarial reconstruction and clustering [9,10].…”
Section: Introductionmentioning
confidence: 99%