M Majhi, AK Pal, SKH Islam… - Transactions on …, 2021 - Wiley Online Library
In this article, a secure image retrieval scheme is proposed, which focuses on providing satisfactory retrieval results, and the framework searches relevant images even in an …
Privacy-preserving cross-modal retrieval is a significant problem in the area of multimedia analysis. As the amount of data is exploding, cross-modal data analysis and retrieval is often …
J Gong, Y Xu, X Zhao - IETE Technical Review, 2018 - Taylor & Francis
With the rapid development of cloud computing technology, more and more users choose to outsource image data to clouds. To protect users' privacy and guarantee data's …
D Li, X Dong, Z Cao, H Wang - Journal of Information Security and …, 2019 - Elsevier
Privacy-protected signal and image processing for outsourced computing has hence recently been popular. We present a framework for privacy-preserving outsourced image …
BR Katika, K Karthik - Pattern Analysis and Applications, 2020 - Springer
Existing architectures used in face anti-spoofing tend to deploy registered spatial measurements to generate feature vectors for spoof detection. This means that the ordering …
Y Ji, P Yue, Z Cui - Cloud Computing and Security: Second International …, 2016 - Springer
Wireless communications and networking technologies are the foundations for road safety applications in Vehicular Ad hoc Networks (VANETs). Since VANET employing IEEE 802.11 …
S Zhao, Y Yao - Transactions on Computer Science and Technology, 2022 - ivypub.org
There are many privacy protection methods in the field of artificial intelligence. Firstly, this paper summarizes the related secure multi-party privacy computing methods, image …
K Karthik, H Balaraman - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
In a cloud environment to preserve privacy of the end user, there arises a need to match and classify images in the encrypted domain. To impart granularity to image-data access it is …