2018
DOI: 10.1109/tcc.2015.2491933
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
79
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 160 publications
(79 citation statements)
references
References 32 publications
0
79
0
Order By: Relevance
“…The inverted file identifier vectors are encrypted by an additive homomorphic encryption or pseudo-random position permutations. In [108], a privacy-preserving content-based image retrieval (CBIR) scheme is proposed to allow the data owner outsource the image database and CBIR operation to the cloud server without disclosing its actual content. The proposed scheme let the cloud server can solve earth movers distance as a linear programming problem without sensitive information of the searched image.…”
Section: Generating Cipher-images In Other Application Scenariosmentioning
confidence: 99%
“…The inverted file identifier vectors are encrypted by an additive homomorphic encryption or pseudo-random position permutations. In [108], a privacy-preserving content-based image retrieval (CBIR) scheme is proposed to allow the data owner outsource the image database and CBIR operation to the cloud server without disclosing its actual content. The proposed scheme let the cloud server can solve earth movers distance as a linear programming problem without sensitive information of the searched image.…”
Section: Generating Cipher-images In Other Application Scenariosmentioning
confidence: 99%
“…The homomorphic encryption results in high computational complexity that makes it consume too much time. Xia et al [14] proposed a secure CBIR scheme with Bag-of-Words model and Earth Movers Distance. The retrieval index was constructed by locality-sensitive hashing.…”
Section: Related Workmentioning
confidence: 99%
“…Many schemes have been proposed in the field of secure CBIR [12][13][14][15][16][17][18][19][20][21][22], which can be roughly classified into two categories. In the first category, image owners extract features from plain images, and then outsource both the encrypted images and the encrypted image features to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…The results show that the algorithm based on homomorphic encryption is time-consuming despite its high level of security. Xia et al [17] proposed an image retrieval scheme based on the scale-invariance feature transform (SIFT) feature and the earth mover's distance (EMD). This scheme uses the SIFT algorithm to extract the image feature.…”
Section: Related Workmentioning
confidence: 99%