-
1
-
-
0033705124
-
Practical techniques for searches in encrypted data
-
Song, D., Wagner, D., and Perrig, A., "Practical techniques for searches in encrypted data," in [IEEE Int. Symposium on Research in Security and Privacy], 44-55 (2000).
-
(2000)
IEEE Int. Symposium on Research in Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
2
-
-
70349220256
-
Condentiality preserving rank-ordered search
-
Swaminathan, A., Mao, Y., Su, G.-M., Gou, H., Varna, A. L., He, S., Wu, M., and Oard, D. W., "Condentiality preserving rank-ordered search," in [ACM Workshop on Storage, Security, and Survivability], 7-12 (2007).
-
(2007)
ACM Workshop on Storage, Security, and Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.-M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
4
-
-
51949104977
-
Private content based image retrieval
-
Shashank, J., Kowshik, P., Srinathan, K., and Jawahar, C., "Private content based image retrieval," in [IEEE Conference on Computer Vision and Pattern Recognition], 1-8 (2008).
-
(2008)
IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1-8
-
-
Shashank, J.1
Kowshik, P.2
Srinathan, K.3
Jawahar, C.4
-
5
-
-
80051561730
-
Enabling search over encrypted multimedia databases
-
Lu, W., Swaminathan, A., Varna, A. L., and Wu, M., "Enabling search over encrypted multimedia databases," in [SPIE Conference on Media Forensics and Security], 1-11 (2009).
-
(2009)
SPIE Conference on Media Forensics and Security
, pp. 1-11
-
-
Lu, W.1
Swaminathan, A.2
Varna, A.L.3
Wu, M.4
-
6
-
-
70349216521
-
Secure image retrieval through feature protection
-
Lu, W., Varna, A. L., Swaminathan, A., and Wu, M., "Secure image retrieval through feature protection," in [IEEE International Conference on Acoustics, Speech and Signal Processing], 1533-1536 (2009).
-
(2009)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.L.2
Swaminathan, A.3
Wu, M.4
-
7
-
-
3042535216
-
Distinctive image features from scale invariant keypoints
-
Lowe, D., "Distinctive image features from scale invariant keypoints," Int. Journal of Computer Vision 60(2), 91-110 (2004).
-
(2004)
Int. Journal of Computer Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.1
-
8
-
-
72449173271
-
Geometric min-hashing: Finding a (thick) needle in a haystack
-
Chum, O., Perdoch, M., and Matas, J., "Geometric min-hashing: Finding a (thick) needle in a haystack," in [IEEE CVPR], 00-01 (2009).
-
(2009)
IEEE CVPR
, pp. 1
-
-
Chum, O.1
Perdoch, M.2
Matas, J.3
-
9
-
-
36849017491
-
Detection of near-duplicate images for web search
-
Foo, J. J., Zobel, J., Sinha, R., and Tahaghoghi, S., "Detection of near-duplicate images for web search," in [CIVR], 00-11 (2007).
-
(2007)
CIVR
, pp. 11
-
-
Foo, J.J.1
Zobel, J.2
Sinha, R.3
Tahaghoghi, S.4
-
10
-
-
24644445700
-
Efficient image matching with distributions of local invariant features
-
Grauman, K. and Darrell, T., "Efficient image matching with distributions of local invariant features," in [CVPR], 627-634 (2005).
-
(2005)
CVPR
, pp. 627-634
-
-
Grauman, K.1
Darrell, T.2
-
11
-
-
30644464160
-
Efficient near-duplicate and sub-image retrieval
-
Ke, Y., Sukthankar, R., and Huston, L., "Efficient near-duplicate and sub-image retrieval," in [ACM MM], 00-01 (2004).
-
(2004)
ACM MM
, pp. 1
-
-
Ke, Y.1
Sukthankar, R.2
Huston, L.3
-
12
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Eurocrypt
-
Paillier, P., "Public-key cryptosystems based on composite degree residuosity classes," in [Eurocrypt, LNCS 1592], 223-238 (1999).
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
79954521296
-
Secure and robust sift
-
Hsu, C. Y., Lu, C. S., and Pei, S. C., "Secure and robust sift," in [ACM MM], (2009).
-
(2009)
ACM MM
-
-
Hsu, C.Y.1
Lu, C.S.2
Pei, S.C.3
-
15
-
-
78349233871
-
Secure sift-based sparse representation for image copy detection and recognition
-
Kang, L. W., Hsu, C. Y., Chen, H. W., and Lu, C. S., "Secure sift-based sparse representation for image copy detection and recognition," in [IEEE Int. Conf. on Multimedia and Expo], (2010).
-
(2010)
IEEE Int. Conf. on Multimedia and Expo
-
-
Kang, L.W.1
Hsu, C.Y.2
Chen, H.W.3
Lu, C.S.4
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C., "Fully homomorphic encryption using ideal lattices," in [STOC], 169-178 (2009).
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
0005301490
-
-
Academic, London, U.K.
-
Rivest, R., Adelman, L., and Dertouzos, M., [Foundations of Secure Computation], Academic, London, U.K. (1978).
-
(1978)
Foundations of Secure Computation
-
-
Rivest, R.1
Adelman, L.2
Dertouzos, M.3
-
18
-
-
84867553981
-
A generalization, a simplification and some applications of paillier probabilistic public-key system
-
Damgard, I. and Jurik, M., "A generalization, a simplification and some applications of paillier probabilistic public-key system," in [Public Key Cryptography], 119-136 (2001).
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
19
-
-
60449095773
-
On the implementation of the discrete fourier transform in the encrypted domain
-
Bianchi, T., Piva, A., and Barni, M., "On the implementation of the discrete fourier transform in the encrypted domain," IEEE Trans. on Information Forensics and Security 4(1), 86-97 (2009).
-
(2009)
IEEE Trans. on Information Forensics and Security
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
20
-
-
69949163699
-
Privacy-preserving face recognition
-
PETS
-
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., and Toft, T., "Privacy-preserving face recognition," in [PETS, LNCS 5672], 235-253 (2009).
-
(2009)
LNCS
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
21
-
-
38049127378
-
A cryptographic method for secure watermark detection
-
Information Hiding Workshop
-
Malkin, M. and Kalker, T., "A cryptographic method for secure watermark detection," in [Information Hiding Workshop, LNCS 4437], 26-41 (2007).
-
(2007)
LNCS
, vol.4437
, pp. 26-41
-
-
Malkin, M.1
Kalker, T.2
-
22
-
-
38149049171
-
Privacy preserving monitoring and surveillance in sensor networks
-
IPSA
-
Oleshchuk, V. A., "Privacy preserving monitoring and surveillance in sensor networks," in [IPSA, LNCS 4743], 485-492 (2007).
-
(2007)
LNCS
, vol.4743
, pp. 485-492
-
-
Oleshchuk, V.A.1
-
23
-
-
77951953963
-
Secure distortion computation between untrusting parties using homomorphic encryption
-
Rane, S. D., Sun, W., and Vetro, A., "Secure distortion computation between untrusting parties using homomorphic encryption," in [IEEE Int. Conf. on Image Processing], 1485-1488 (2009).
-
(2009)
IEEE Int. Conf. on Image Processing
, pp. 1485-1488
-
-
Rane, S.D.1
Sun, W.2
Vetro, A.3
-
24
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgard, I., Geisler, M., and Kroigard, M., "Homomorphic encryption and secure comparison," Int. Journal of Applied Cryptography 1(1), 22-31 (2008).
-
(2008)
Int. Journal of Applied Cryptography
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
25
-
-
84957877979
-
Attacks on copyright marking systems
-
Int. Workshop on Information Hiding
-
Petitcolas, F., Anderson, R. J., and Kuhn, M. G., "Attacks on copyright marking systems," in [Int. Workshop on Information Hiding, LNCS 1575], 218-238 (1998).
-
(1998)
LNCS
, vol.1575
, pp. 218-238
-
-
Petitcolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
26
-
-
84932617705
-
Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories
-
Li, F.-F., Fergus, R., and Perona, P., "Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories," in [IEEE CVPR Workshop on Generative-Model Based Vision], 178-178 (2004).
-
(2004)
IEEE CVPR Workshop on Generative-Model Based Vision
, pp. 178-178
-
-
Li, F.-F.1
Fergus, R.2
Perona, P.3
-
27
-
-
34948904828
-
-
Technical Report. California Institute of Technology
-
Griffin, G., Holub, A., and Perona, P., "Caltech-256 object category dataset," in [Technical Report. California Institute of Technology], (2007).
-
(2007)
Caltech-256 Object Category Dataset
-
-
Griffin, G.1
Holub, A.2
Perona, P.3
-
28
-
-
78651101119
-
Secure and robust sift with resistance to chosen-plaintext attack
-
Hsu, C. Y., Lu, C. S., and Pei, S. C., "Secure and robust sift with resistance to chosen-plaintext attack," in [IEEE Int. Conf. on Image Processing], (2010).
-
(2010)
IEEE Int. Conf. on Image Processing
-
-
Hsu, C.Y.1
Lu, C.S.2
Pei, S.C.3
|