2013
DOI: 10.1007/s11760-013-0471-0
|View full text |Cite
|
Sign up to set email alerts
|

Transparent hashing in the encrypted domain for privacy preserving image retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Analogously, F‐Score encrypted feature for the Corel‐1K dataset is addressed, which implies that the correctness of the retrieval result is maintained even in the encrypted domain. Categorical retrieval accuracy of Corel‐1K dataset is shown in Table 4, which shows that retrieval efficiency in terms of P, R, and F of PM ( E ) is satisfactory better than the existing work THED, 28 EDCBIR, 49 PPCE, 24 and ISSEDB 23 …”
Section: Resultsmentioning
confidence: 91%
See 3 more Smart Citations
“…Analogously, F‐Score encrypted feature for the Corel‐1K dataset is addressed, which implies that the correctness of the retrieval result is maintained even in the encrypted domain. Categorical retrieval accuracy of Corel‐1K dataset is shown in Table 4, which shows that retrieval efficiency in terms of P, R, and F of PM ( E ) is satisfactory better than the existing work THED, 28 EDCBIR, 49 PPCE, 24 and ISSEDB 23 …”
Section: Resultsmentioning
confidence: 91%
“…This implies that the proposed work with encrypted feature provides satisfactory security, efficient and effective retrieval scheme. Moreover, its retrieval processing time is far better than THED, 28 EDCBIR, 49 PPCE, 24 and ISSEDB 23 for top 20, 30, and 40 image retrieval shown in Table 10. This implies that the proposed method provides efficient image retrieval with secured image features.…”
Section: Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…Lu et al [14] proposed three distance-preserving methods: bit plane randomization, random projection, and random unary encoding, which are applied on low-level features such as color histogram. Karthik et al [15] proposed a transparent privacypreserving hash method, which keeps the statistical rules of encrypted AC coefficients but ignores the spatial information distribution of the image. Xu et al [16] proposed a secure retrieval method for JPEG images, which preserves the distribution of the AC coefficients and the statistical rule of color after the decoding of encrypted images.…”
Section: Introductionmentioning
confidence: 99%