메뉴 건너뛰기




Volumn , Issue , 2010, Pages 492-497

Privacy-preserving approximation of L1 distance for multimedia applications

Author keywords

Homomorphic encryption; Johnson Lindenstrauss embedding; Secure multiparty computation

Indexed keywords

COMMUNICATION CONSTRAINTS; COMMUNICATION OVERHEADS; DISTANCE CALCULATION; FACE FEATURE VECTORS; FACE IMAGES; HOMOMORPHIC-ENCRYPTIONS; JOHNSON-LINDENSTRAUSS EMBEDDING; KEY EXCHANGE; MULTIMEDIA APPLICATIONS; PRIVACY CONSTRAINTS; PRIVACY PRESERVING; REMOTE DATABASE; SECURE MULTI-PARTY COMPUTATION; SECURE TWO-PARTY COMPUTATIONS;

EID: 78349236191     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICME.2010.5583030     Document Type: Conference Paper
Times cited : (29)

References (11)
  • 4
    • 0034504507 scopus 로고    scopus 로고
    • Stable distributions, pseudorandom generators, embeddings and data stream computation
    • Redondo Beach, CA, Nov.
    • P. Indyk, " Stable Distributions, Pseudorandom Generators, Embeddings and Data Stream Computation," in IEEE Symposium on Foundations of Computer Science, Redondo Beach, CA, Nov. 2000, pp. 189-197.
    • (2000) IEEE Symposium on Foundations of Computer Science , pp. 189-197
    • Indyk, P.1
  • 6
    • 0001654702 scopus 로고
    • Extensions of lipschitz mapping into hilbert space
    • W. B. Johnson and J. Lindenstrauss, "Extensions of Lipschitz Mapping Into Hilbert Space," Contemporary Mathematics, vol. 26, pp. 189-206, 1984.
    • (1984) Contemporary Mathematics , vol.26 , pp. 189-206
    • Johnson, W.B.1    Lindenstrauss, J.2
  • 7
    • 0038166193 scopus 로고    scopus 로고
    • Database-friendly random projections: Johnson-lindenstrauss with binary coins
    • D. Achlioptas, "Database-friendly Random Projections: Johnson-lindenstrauss With Binary Coins," Journal of Computer and System Sciences, vol. 66, pp. 671-687, 2003.
    • (2003) Journal of Computer and System Sciences , vol.66 , pp. 671-687
    • Achlioptas, D.1
  • 8
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer-Verlag, Lecture Notes in Computer Science
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, EUROCRYPT 99. 1999, vol. 1592, pp. 233-238, Springer-Verlag, Lecture Notes in Computer Science.
    • (1999) Advances in Cryptology, EUROCRYPT 99. , vol.1592 , pp. 233-238
    • Paillier, P.1
  • 9
    • 77951953963 scopus 로고    scopus 로고
    • Secure distortion computation in the encrypted domain using homomorphic encryption
    • Cairo, Egypt, Oct.
    • S. Rane, W. Sun, and A. Vetro, "Secure Distortion Computation in the Encrypted Domain Using Homomorphic Encryption," in Proc. IEEE International Conference on Image Processing, Cairo, Egypt, Oct. 2009.
    • (2009) Proc. IEEE International Conference on Image Processing
    • Rane, S.1    Sun, W.2    Vetro, A.3
  • 10
    • 84893763193 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST)
    • National Institute of Standards and Technology (NIST), "Multiple biometric grand challenge database," http://face.nist.gov/mbgc/.
    • Multiple Biometric Grand Challenge Database


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.