A privacy-preserving content-based image retrieval method in cloud environment

Y Xu, J Gong, L Xiong, Z Xu, J Wang, Y Shi - Journal of Visual …, 2017 - Elsevier
In order to protect data privacy, image with sensitive or private information needs to be
encrypted before being outsourced to a cloud service provider. However, this causes …

Secure content‐based image retrieval using modified Euclidean distance for encrypted features

M Majhi, AK Pal, SKH Islam… - Transactions on …, 2021 - Wiley Online Library
In this article, a secure image retrieval scheme is proposed, which focuses on providing
satisfactory retrieval results, and the framework searches relevant images even in an …

DAPCMH: Deep Adversarial Privacy-Preserving Cross-Modal Hashing

L Zhu, J Song, Z Yang, W Huang, C Zhang… - Neural Processing …, 2022 - Springer
Privacy-preserving cross-modal retrieval is a significant problem in the area of multimedia
analysis. As the amount of data is exploding, cross-modal data analysis and retrieval is often …

A privacy-preserving image retrieval method based on improved bovw model in cloud environment

J Gong, Y Xu, X Zhao - IETE Technical Review, 2018 - Taylor & Francis
With the rapid development of cloud computing technology, more and more users choose to
outsource image data to clouds. To protect users' privacy and guarantee data's …

Privacy-preserving outsourced image feature extraction

D Li, X Dong, Z Cao, H Wang - Journal of Information Security and …, 2019 - Elsevier
Privacy-protected signal and image processing for outsourced computing has hence
recently been popular. We present a framework for privacy-preserving outsourced image …

Face anti-spoofing by identity masking using random walk patterns and outlier detection

BR Katika, K Karthik - Pattern Analysis and Applications, 2020 - Springer
Existing architectures used in face anti-spoofing tend to deploy registered spatial
measurements to generate feature vectors for spoof detection. This means that the ordering …

一种云环境下JPEG 图像的安全检索方法.

韩威, 申铭, 徐彦彦, 徐正全 - Application Research of …, 2017 - search.ebscohost.com
为了保护数据隐私, 私密图像在上传到云服务器之前需要进行加密, 然而, 加密会导致传统的图像
特征无法提取, 进而给图像检索带来困难. 针对密文图像的检索问题, 提出了一种云环境下JPEG …

VANET 2.0: integrating visible light with radio frequency communications for safety applications

Y Ji, P Yue, Z Cui - Cloud Computing and Security: Second International …, 2016 - Springer
Wireless communications and networking technologies are the foundations for road safety
applications in Vehicular Ad hoc Networks (VANETs). Since VANET employing IEEE 802.11 …

Research on Privacy Protection of Intelligent Applications

S Zhao, Y Yao - Transactions on Computer Science and Technology, 2022 - ivypub.org
There are many privacy protection methods in the field of artificial intelligence. Firstly, this
paper summarizes the related secure multi-party privacy computing methods, image …

Key independent encrypted face clustering

K Karthik, H Balaraman - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
In a cloud environment to preserve privacy of the end user, there arises a need to match and
classify images in the encrypted domain. To impart granularity to image-data access it is …