메뉴 건너뛰기




Volumn 7880, Issue , 2011, Pages

Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction

Author keywords

Feature extraction; Homomorphic encryption; Privacy preserving; Security; SIFT

Indexed keywords

COMPARISON STRATEGY; HOMOMORPHIC ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; MEDIA RETRIEVAL; MULTIMEDIA COMMUNITY; MULTIMEDIA RETRIEVAL; PAILLIER CRYPTOSYSTEM; PRIVACY PRESERVING; SCALE INVARIANT FEATURE TRANSFORMS; SECURITY; SIFT; SIFT FEATURE;

EID: 79954510617     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.873325     Document Type: Conference Paper
Times cited : (57)

References (28)
  • 7
    • 3042535216 scopus 로고    scopus 로고
    • Distinctive image features from scale invariant keypoints
    • Lowe, D., "Distinctive image features from scale invariant keypoints," Int. Journal of Computer Vision 60(2), 91-110 (2004).
    • (2004) Int. Journal of Computer Vision , vol.60 , Issue.2 , pp. 91-110
    • Lowe, D.1
  • 8
    • 72449173271 scopus 로고    scopus 로고
    • Geometric min-hashing: Finding a (thick) needle in a haystack
    • Chum, O., Perdoch, M., and Matas, J., "Geometric min-hashing: Finding a (thick) needle in a haystack," in [IEEE CVPR], 00-01 (2009).
    • (2009) IEEE CVPR , pp. 1
    • Chum, O.1    Perdoch, M.2    Matas, J.3
  • 9
    • 36849017491 scopus 로고    scopus 로고
    • Detection of near-duplicate images for web search
    • Foo, J. J., Zobel, J., Sinha, R., and Tahaghoghi, S., "Detection of near-duplicate images for web search," in [CIVR], 00-11 (2007).
    • (2007) CIVR , pp. 11
    • Foo, J.J.1    Zobel, J.2    Sinha, R.3    Tahaghoghi, S.4
  • 10
    • 24644445700 scopus 로고    scopus 로고
    • Efficient image matching with distributions of local invariant features
    • Grauman, K. and Darrell, T., "Efficient image matching with distributions of local invariant features," in [CVPR], 627-634 (2005).
    • (2005) CVPR , pp. 627-634
    • Grauman, K.1    Darrell, T.2
  • 11
    • 30644464160 scopus 로고    scopus 로고
    • Efficient near-duplicate and sub-image retrieval
    • Ke, Y., Sukthankar, R., and Huston, L., "Efficient near-duplicate and sub-image retrieval," in [ACM MM], 00-01 (2004).
    • (2004) ACM MM , pp. 1
    • Ke, Y.1    Sukthankar, R.2    Huston, L.3
  • 12
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Eurocrypt
    • Paillier, P., "Public-key cryptosystems based on composite degree residuosity classes," in [Eurocrypt, LNCS 1592], 223-238 (1999).
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
  • 16
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Gentry, C., "Fully homomorphic encryption using ideal lattices," in [STOC], 169-178 (2009).
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 18
    • 84867553981 scopus 로고    scopus 로고
    • A generalization, a simplification and some applications of paillier probabilistic public-key system
    • Damgard, I. and Jurik, M., "A generalization, a simplification and some applications of paillier probabilistic public-key system," in [Public Key Cryptography], 119-136 (2001).
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 19
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete fourier transform in the encrypted domain
    • Bianchi, T., Piva, A., and Barni, M., "On the implementation of the discrete fourier transform in the encrypted domain," IEEE Trans. on Information Forensics and Security 4(1), 86-97 (2009).
    • (2009) IEEE Trans. on Information Forensics and Security , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 21
    • 38049127378 scopus 로고    scopus 로고
    • A cryptographic method for secure watermark detection
    • Information Hiding Workshop
    • Malkin, M. and Kalker, T., "A cryptographic method for secure watermark detection," in [Information Hiding Workshop, LNCS 4437], 26-41 (2007).
    • (2007) LNCS , vol.4437 , pp. 26-41
    • Malkin, M.1    Kalker, T.2
  • 22
    • 38149049171 scopus 로고    scopus 로고
    • Privacy preserving monitoring and surveillance in sensor networks
    • IPSA
    • Oleshchuk, V. A., "Privacy preserving monitoring and surveillance in sensor networks," in [IPSA, LNCS 4743], 485-492 (2007).
    • (2007) LNCS , vol.4743 , pp. 485-492
    • Oleshchuk, V.A.1
  • 23
    • 77951953963 scopus 로고    scopus 로고
    • Secure distortion computation between untrusting parties using homomorphic encryption
    • Rane, S. D., Sun, W., and Vetro, A., "Secure distortion computation between untrusting parties using homomorphic encryption," in [IEEE Int. Conf. on Image Processing], 1485-1488 (2009).
    • (2009) IEEE Int. Conf. on Image Processing , pp. 1485-1488
    • Rane, S.D.1    Sun, W.2    Vetro, A.3
  • 25
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Int. Workshop on Information Hiding
    • Petitcolas, F., Anderson, R. J., and Kuhn, M. G., "Attacks on copyright marking systems," in [Int. Workshop on Information Hiding, LNCS 1575], 218-238 (1998).
    • (1998) LNCS , vol.1575 , pp. 218-238
    • Petitcolas, F.1    Anderson, R.J.2    Kuhn, M.G.3
  • 26
    • 84932617705 scopus 로고    scopus 로고
    • Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories
    • Li, F.-F., Fergus, R., and Perona, P., "Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories," in [IEEE CVPR Workshop on Generative-Model Based Vision], 178-178 (2004).
    • (2004) IEEE CVPR Workshop on Generative-Model Based Vision , pp. 178-178
    • Li, F.-F.1    Fergus, R.2    Perona, P.3
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.