2009 IEEE International Conference on Acoustics, Speech and Signal Processing 2009
DOI: 10.1109/icassp.2009.4959888
|View full text |Cite
|
Sign up to set email alerts
|

Secure image retrieval through feature protection

Abstract: This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focuses on image feature protection techniques which enable similarity comparison among protected features. By utilizing both signal processing and cryptographic techniques, three schemes are investigated and compared, including bitplane randomization, random projection, and randomized unary encoding. Experimental results show that secure i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
82
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(84 citation statements)
references
References 7 publications
1
82
0
1
Order By: Relevance
“…For such cases, the integer vectors can be naively mapped into binary feature vectors which are elements of a real-valued ℓ 2 metric space, such that the squared ℓ 2 distance between the binary vectors is equal to the ℓ 1 distance between the original integer feature vectors. 17,39 In particular, without loss of generality, consider that each element u i , i ∈ {1, 2, . .…”
Section: Extension To Nn Search Based On Non-euclidean Distance Measuresmentioning
confidence: 99%
“…For such cases, the integer vectors can be naively mapped into binary feature vectors which are elements of a real-valued ℓ 2 metric space, such that the squared ℓ 2 distance between the binary vectors is equal to the ℓ 1 distance between the original integer feature vectors. 17,39 In particular, without loss of generality, consider that each element u i , i ∈ {1, 2, . .…”
Section: Extension To Nn Search Based On Non-euclidean Distance Measuresmentioning
confidence: 99%
“…The dataset consists of 1000 images grouped in 10 classes; each class contains 100 color images [14]. These classes are categorized as Africa, Beach, Buildings, Buses, Dinosaurs, Flowers, Elephants, Horses, Mountains, and Food.…”
Section: Resultsmentioning
confidence: 99%
“…Both image operations and cryptographic primitives are combinely studied in [12], [13]. In [4], [14], the authors study about the oblivious/private retrieval of images. In [4], the authors focus on oblivious comparison of image features and claim that this step alone could suffice for obliviously retrieving the images from the database.…”
Section: A Limitation Of Prior Researchmentioning
confidence: 99%
“…In [4], [14], the authors study about the oblivious/private retrieval of images. In [4], the authors focus on oblivious comparison of image features and claim that this step alone could suffice for obliviously retrieving the images from the database. However, the features considered in their implementation are color histograms.…”
Section: A Limitation Of Prior Researchmentioning
confidence: 99%
See 1 more Smart Citation