메뉴 건너뛰기




Volumn 54, Issue 10, 2011, Pages 1661-1674

Secure image retrieval based on visual content and watermarking protocol

Author keywords

content based image retrieval; could computing; query by watermarked image; secure image retrieval; user's right problem; watermarking protocol

Indexed keywords

CONTENT BASED IMAGE RETRIEVAL; COULD COMPUTING; USER'S RIGHT PROBLEM; WATERMARKED IMAGES; WATERMARKING PROTOCOL;

EID: 80053559396     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr078     Document Type: Article
Times cited : (10)

References (38)
  • 2
    • 43249093335 scopus 로고    scopus 로고
    • Image retrieval: Ideas, influences, and trends of the new age
    • Datta, R., Joshi, D., Li, J. andWang, J.Z. (2008) Image retrieval: ideas, influences, and trends of the new age. ACMComput. Surv., 40, 5:1-5:60.
    • (2008) ACMComput. Surv. , vol.40 , pp. 51-560
    • Datta, R.1    Joshi, D.2    Li, J.3    Wang, J.Z.4
  • 3
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst., 25, 599-616.
    • (2009) Future Gener. Comput. Syst. , vol.25 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 4
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • Armbrust, M. et al. (2010)A view of cloud computing. Commun. ACM, 53, 50-58.
    • (2010) Commun. ACM , vol.53 , pp. 50-58
    • Armbrust, M.1
  • 6
    • 0041339711 scopus 로고    scopus 로고
    • Watermarking in secure image retrieval
    • Li, X. (2003) Watermarking in secure image retrieval. Pattern Recognit. Lett., 24, 2431-2434.
    • (2003) Pattern Recognit. Lett. , vol.24 , pp. 2431-2434
    • Li, X.1
  • 7
    • 1242318724 scopus 로고    scopus 로고
    • A review of content-based image retrieval systems in medical applications - clinical benefits and future directions
    • Muller, H., Michoux, N., Bandon, D. and Geissbuhler,A. (2004) A review of content-based image retrieval systems in medical applications - clinical benefits and future directions. Int. J. Med. Inform., 73, 1-23.
    • (2004) Int. J. Med. Inform. , vol.73 , pp. 1-23
    • Muller, H.1    Michoux, N.2    Bandon, D.3    Geissbuhler, A.4
  • 9
    • 0032155522 scopus 로고    scopus 로고
    • Watermarking schemes and protocols for protecting rightful ownership and customer's rights
    • Qiao, L. and Nahrstedt, K. (1998) Watermarking schemes and protocols for protecting rightful ownership and customer's rights. J. Vis. Commun. Image Represent., 9, 194-210.
    • (1998) J. Vis. Commun. Image Represent. , vol.9 , pp. 194-210
    • Qiao, L.1    Nahrstedt, K.2
  • 10
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Memon, N. andWong, P.W. (2001)A buyer-seller watermarking protocol. IEEE Trans. Image Process, 10, 643-649.
    • (2001) IEEE Trans. Image Process , vol.10 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 11
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • Lei, C.-L., Yu, P.-L., Tsai, P.-L. and Chan, M.-H. (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process, 13, 1618-1626.
    • (2004) IEEE Trans. Image Process , vol.13 , pp. 1618-1626
    • Lei, C.-L.1    Yu, P.-L.2    Tsai, P.-L.3    Chan, M.-H.4
  • 12
    • 70449579254 scopus 로고    scopus 로고
    • Watermarking protocol for protecting user's right in content based image retrieval
    • June 28-July 3, IEEE Computer Society, NewYork City, NY, USA
    • Zhang, J. andYe, L. (2009)Watermarking Protocol for Protecting User's Right in Content Based Image Retrieval. IEEE Int. Conf. Multimedia and Expo, June 28-July 3, pp. 1082-1085. IEEE Computer Society, NewYork City, NY, USA.
    • (2009) IEEE Int. Conf. Multimedia and Expo , pp. 1082-1085
    • Zhang, J.1    Ye, L.2
  • 13
    • 35248849802 scopus 로고    scopus 로고
    • An anonymous buyer-seller watermarking protocol with anonymity control
    • November 28-29, Springer, Seoul, Korea
    • Ju, H.S., Kim, H.J., Lee, D.H. and Lim, J.I. (2002)AnAnonymous buyer-seller Watermarking Protocol with Anonymity Control. Int. Conf. Information Security and Cryptology, November 28- 29, pp. 421-432. Springer, Seoul, Korea.
    • (2002) Int. Conf. Information Security and Cryptology , pp. 421-432
    • Ju, H.S.1    Kim, H.J.2    Lee, D.H.3    Lim, J.I.4
  • 14
    • 37549049726 scopus 로고    scopus 로고
    • Watermarking protocol of secure verification
    • (1-4)
    • Zhang, J., Kou, W., Fan, K. and Ye, L. (2007) Watermarking protocol of secure verification. J. Electron. Imaging, 16, 043002(1-4).
    • (2007) J. Electron. Imaging , vol.16 , pp. 043002
    • Zhang, J.1    Kou, W.2    Fan, K.3    Ye, L.4
  • 15
  • 18
    • 0242372124 scopus 로고    scopus 로고
    • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
    • October 16-19, Springer, Kunming, China
    • Choi, J.G., Sakurai, K. and Park, J.H. (2003) Does it NeedTrusted Third Party? Design of buyer-seller Watermarking Protocol Without Trusted Third Party. Int. Conf. Applied Cryptography and Network Security, October 16-19, pp. 265-279. Springer, Kunming, China.
    • (2003) Int. Conf. Applied Cryptography and Network Security , pp. 265-279
    • Choi, J.G.1    Sakurai, K.2    Park, J.H.3
  • 19
    • 33645737923 scopus 로고    scopus 로고
    • Secure buyer-seller watermarking protocol
    • Zhang, J., Kou, W. and Fan, K. (2006) Secure buyer-seller watermarking protocol. IEE Proc.-Inf. Secur., 153, 15-18.
    • (2006) IEE Proc.-Inf. Secur. , vol.153 , pp. 15-18
    • Zhang, J.1    Kou, W.2    Fan, K.3
  • 20
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Kuribayashi, M. and Tanaka, H. (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process, 14, 2129-2139.
    • (2005) IEEE Trans. Image Process , vol.14 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 21
    • 46749090078 scopus 로고    scopus 로고
    • An Effective and Secure buyer-seller Watermarking Protocol
    • August 29-31, IEEE Computer Society, Manchester, UK
    • Ibrahim, I.M., El-Din, S.H.N. and Hegazy, A.F.A. (2007) An Effective and Secure buyer-seller Watermarking Protocol. Int. Symp. Information Assurance and Security, August 29-31, pp. 21-28. IEEE Computer Society, Manchester, UK.
    • (2007) Int. Symp. Information Assurance and Security , pp. 21-28
    • Ibrahim, I.M.1    El-Din, S.H.N.2    Hegazy, A.F.A.3
  • 22
    • 51049112011 scopus 로고    scopus 로고
    • On secure and anonymous buyer-seller watermarking protocol
    • Athens, Greece, June 8-13, IEEE Computer Society
    • Deng, M. and Preneel, B. (2008) On Secure and Anonymous buyer-seller Watermarking Protocol. Int. Conf. Internet and Web Applications and Services, Athens, Greece, June 8-13, pp. 524-529. IEEE Computer Society.
    • (2008) Int. Conf. Internet and Web Applications and Services , pp. 524-529
    • Deng, M.1    Preneel, B.2
  • 23
    • 78650587272 scopus 로고    scopus 로고
    • Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents
    • Phan, R.C.-W., Goi, B.M., Poh, G.S. and Kim, J. (2009) Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wirel. Pers. Commun., 56, 73-83.
    • (2009) Wirel. Pers. Commun. , vol.56 , pp. 73-83
    • Phan, R.C.-W.1    Goi, B.M.2    Poh, G.S.3    Kim, J.4
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R., Shamir, A. and Adelman, L. (1978) A method for obtaining digital signatures and public key cryptosystems. ACM Commun., 21, 120-126.
    • (1978) ACM Commun. , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 26
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • Fontaine, C. and Galand, F. (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur., 2007, 15:1-15:15.
    • (2007) EURASIP J. Inf. Secur. , vol.2007 , pp. 151-1515
    • Fontaine, C.1    Galand, F.2
  • 27
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • September 16-19, IEEE Signal Processing Society, Lausanne, Switzerland
    • Schneider, M. and Chang, S.-F. (1996) A Robust Content Based Digital Signature for Image Authentication. IEEE Conf. Image Processing, September 16-19, pp. 227-230. IEEE Signal Processing Society, Lausanne, Switzerland.
    • (1996) IEEE Conf. Image Processing , pp. 227-230
    • Schneider, M.1    Chang, S.-F.2
  • 28
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • Monga, V. and Evans, B.L. (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEETrans. Image Process, 15, 3453-3466.
    • (2006) IEEE Trans. Image Process , vol.15 , pp. 3453-3466
    • Monga, V.1    Evans, B.L.2
  • 29
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • NewYork, NY, USA, May 31-June 2, ACM
    • Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. ACMSymp. Theory of Computing, NewYork, NY, USA, May 31-June 2, pp. 169-178. ACM.
    • (2009) ACM Symp. Theory of Computing , pp. 169-178
    • Gentry, C.1
  • 30
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • Gligor, V.D. (1984) A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng., 10, 320-324.
    • (1984) IEEE Trans. Softw. Eng. , vol.10 , pp. 320-324
    • Gligor, V.D.1
  • 31
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • Peng, T., Leckie, C. and Ramamohanarao, K. (2007) Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv., 39, 1-42.
    • (2007) ACM Comput. Surv. , vol.39 , pp. 1-42
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 33
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An ip traceback system to find the real source of attacks
    • Xiang, Y., Zhou, W. and Guo, M. (2009) Flexible deterministic packet marking: An ip traceback system to find the real source of attacks. IEEE Trans. Parallel Distrib. Syst., 20, 567-580.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 34
    • 0035440673 scopus 로고    scopus 로고
    • Simplicity: Semantics-sensitive integrated matching for picture libraries
    • Wang, J.Z., Li, J. and Wiederhold, G. (2001) Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell., 23, 947-963.
    • (2001) IEEE Trans. Pattern Anal. Mach. Intell. , vol.23 , pp. 947-963
    • Wang, J.Z.1    Li, J.2    Wiederhold, G.3
  • 36
    • 0038520452 scopus 로고    scopus 로고
    • JTC1/SC29/WG11, International Strandard. ISO/IEC
    • JTC1/SC29/WG11. (2004) Mpeg-7 overview (version 10). International Strandard. ISO/IEC.
    • (2004) Mpeg-7 Overview (version 10)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.