-
1
-
-
0034498523
-
Content-based image retrieval at the end of the early years
-
Smeulders,A.W.M.,Worring, M., Santini, S., Gupta, A. and Jain, R. (2000) Content-based image retrieval at the end of the early years. IEEE Trans. Pattern Anal. Mach. Intell., 22, 1349-1380.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, pp. 1349-1380
-
-
Smeulders, A.W.M.1
Worring, M.2
Santini, S.3
Gupta, A.4
Jain, R.5
-
2
-
-
43249093335
-
Image retrieval: Ideas, influences, and trends of the new age
-
Datta, R., Joshi, D., Li, J. andWang, J.Z. (2008) Image retrieval: ideas, influences, and trends of the new age. ACMComput. Surv., 40, 5:1-5:60.
-
(2008)
ACMComput. Surv.
, vol.40
, pp. 51-560
-
-
Datta, R.1
Joshi, D.2
Li, J.3
Wang, J.Z.4
-
3
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst., 25, 599-616.
-
(2009)
Future Gener. Comput. Syst.
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
4
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M. et al. (2010)A view of cloud computing. Commun. ACM, 53, 50-58.
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
-
5
-
-
0001176213
-
Finding naked people
-
April 14-18, Springer, Cambridge, UK
-
Fleck, M.M., Forsyth, D.A. and Bregler, C. (1996) Finding Naked People. European Conf. Computer Vision, April 14-18, pp. 593-602. Springer, Cambridge, UK.
-
(1996)
European Conf. Computer Vision
, pp. 593-602
-
-
Fleck, M.M.1
Forsyth, D.A.2
Bregler, C.3
-
6
-
-
0041339711
-
Watermarking in secure image retrieval
-
Li, X. (2003) Watermarking in secure image retrieval. Pattern Recognit. Lett., 24, 2431-2434.
-
(2003)
Pattern Recognit. Lett.
, vol.24
, pp. 2431-2434
-
-
Li, X.1
-
7
-
-
1242318724
-
A review of content-based image retrieval systems in medical applications - clinical benefits and future directions
-
Muller, H., Michoux, N., Bandon, D. and Geissbuhler,A. (2004) A review of content-based image retrieval systems in medical applications - clinical benefits and future directions. Int. J. Med. Inform., 73, 1-23.
-
(2004)
Int. J. Med. Inform.
, vol.73
, pp. 1-23
-
-
Muller, H.1
Michoux, N.2
Bandon, D.3
Geissbuhler, A.4
-
8
-
-
0003782852
-
-
Morgan Kaufmann, Burlington, MA, USA
-
Cox, I., Miller, M. and Bloom, J. (2001) Digital Watermarking: Principles and Practice. Morgan Kaufmann, Burlington, MA, USA.
-
(2001)
Digital Watermarking: Principles and Practice
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
-
9
-
-
0032155522
-
Watermarking schemes and protocols for protecting rightful ownership and customer's rights
-
Qiao, L. and Nahrstedt, K. (1998) Watermarking schemes and protocols for protecting rightful ownership and customer's rights. J. Vis. Commun. Image Represent., 9, 194-210.
-
(1998)
J. Vis. Commun. Image Represent.
, vol.9
, pp. 194-210
-
-
Qiao, L.1
Nahrstedt, K.2
-
10
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Memon, N. andWong, P.W. (2001)A buyer-seller watermarking protocol. IEEE Trans. Image Process, 10, 643-649.
-
(2001)
IEEE Trans. Image Process
, vol.10
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
11
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Lei, C.-L., Yu, P.-L., Tsai, P.-L. and Chan, M.-H. (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process, 13, 1618-1626.
-
(2004)
IEEE Trans. Image Process
, vol.13
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
12
-
-
70449579254
-
Watermarking protocol for protecting user's right in content based image retrieval
-
June 28-July 3, IEEE Computer Society, NewYork City, NY, USA
-
Zhang, J. andYe, L. (2009)Watermarking Protocol for Protecting User's Right in Content Based Image Retrieval. IEEE Int. Conf. Multimedia and Expo, June 28-July 3, pp. 1082-1085. IEEE Computer Society, NewYork City, NY, USA.
-
(2009)
IEEE Int. Conf. Multimedia and Expo
, pp. 1082-1085
-
-
Zhang, J.1
Ye, L.2
-
13
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
November 28-29, Springer, Seoul, Korea
-
Ju, H.S., Kim, H.J., Lee, D.H. and Lim, J.I. (2002)AnAnonymous buyer-seller Watermarking Protocol with Anonymity Control. Int. Conf. Information Security and Cryptology, November 28- 29, pp. 421-432. Springer, Seoul, Korea.
-
(2002)
Int. Conf. Information Security and Cryptology
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
-
14
-
-
37549049726
-
Watermarking protocol of secure verification
-
(1-4)
-
Zhang, J., Kou, W., Fan, K. and Ye, L. (2007) Watermarking protocol of secure verification. J. Electron. Imaging, 16, 043002(1-4).
-
(2007)
J. Electron. Imaging
, vol.16
, pp. 043002
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
Ye, L.4
-
16
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Katzenbeisser, S., Lemma, A., Celik, M.U., Veen, M. and Maas, M. (2008) A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Sec., 3, 783-786.
-
(2008)
IEEE Trans. Inf. Forensics Sec.
, vol.3
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Veen, M.4
Maas, M.5
-
17
-
-
70450235529
-
Joint watermarking scheme for multiparty multilevel drm architecture
-
Thomas,T., Emmanuel, S., Subramanyam,A.V. and Kankanhalli, M.S. (2009) Joint watermarking scheme for multiparty multilevel drm architecture. IEEE Trans. Inf. Forensics Sec., 4, 758-767.
-
(2009)
IEEE Trans. Inf. Forensics Sec.
, vol.4
, pp. 758-767
-
-
Emmanuel, S.1
Subramanyam, A.V.2
Kankanhalli, M.S.3
-
18
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
October 16-19, Springer, Kunming, China
-
Choi, J.G., Sakurai, K. and Park, J.H. (2003) Does it NeedTrusted Third Party? Design of buyer-seller Watermarking Protocol Without Trusted Third Party. Int. Conf. Applied Cryptography and Network Security, October 16-19, pp. 265-279. Springer, Kunming, China.
-
(2003)
Int. Conf. Applied Cryptography and Network Security
, pp. 265-279
-
-
Choi, J.G.1
Sakurai, K.2
Park, J.H.3
-
19
-
-
33645737923
-
Secure buyer-seller watermarking protocol
-
Zhang, J., Kou, W. and Fan, K. (2006) Secure buyer-seller watermarking protocol. IEE Proc.-Inf. Secur., 153, 15-18.
-
(2006)
IEE Proc.-Inf. Secur.
, vol.153
, pp. 15-18
-
-
Zhang, J.1
Kou, W.2
Fan, K.3
-
20
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Kuribayashi, M. and Tanaka, H. (2005) Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process, 14, 2129-2139.
-
(2005)
IEEE Trans. Image Process
, vol.14
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
21
-
-
46749090078
-
An Effective and Secure buyer-seller Watermarking Protocol
-
August 29-31, IEEE Computer Society, Manchester, UK
-
Ibrahim, I.M., El-Din, S.H.N. and Hegazy, A.F.A. (2007) An Effective and Secure buyer-seller Watermarking Protocol. Int. Symp. Information Assurance and Security, August 29-31, pp. 21-28. IEEE Computer Society, Manchester, UK.
-
(2007)
Int. Symp. Information Assurance and Security
, pp. 21-28
-
-
Ibrahim, I.M.1
El-Din, S.H.N.2
Hegazy, A.F.A.3
-
22
-
-
51049112011
-
On secure and anonymous buyer-seller watermarking protocol
-
Athens, Greece, June 8-13, IEEE Computer Society
-
Deng, M. and Preneel, B. (2008) On Secure and Anonymous buyer-seller Watermarking Protocol. Int. Conf. Internet and Web Applications and Services, Athens, Greece, June 8-13, pp. 524-529. IEEE Computer Society.
-
(2008)
Int. Conf. Internet and Web Applications and Services
, pp. 524-529
-
-
Deng, M.1
Preneel, B.2
-
23
-
-
78650587272
-
Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents
-
Phan, R.C.-W., Goi, B.M., Poh, G.S. and Kim, J. (2009) Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents. Wirel. Pers. Commun., 56, 73-83.
-
(2009)
Wirel. Pers. Commun.
, vol.56
, pp. 73-83
-
-
Phan, R.C.-W.1
Goi, B.M.2
Poh, G.S.3
Kim, J.4
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R., Shamir, A. and Adelman, L. (1978) A method for obtaining digital signatures and public key cryptosystems. ACM Commun., 21, 120-126.
-
(1978)
ACM Commun.
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
26
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Fontaine, C. and Galand, F. (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur., 2007, 15:1-15:15.
-
(2007)
EURASIP J. Inf. Secur.
, vol.2007
, pp. 151-1515
-
-
Fontaine, C.1
Galand, F.2
-
27
-
-
0030409375
-
A robust content based digital signature for image authentication
-
September 16-19, IEEE Signal Processing Society, Lausanne, Switzerland
-
Schneider, M. and Chang, S.-F. (1996) A Robust Content Based Digital Signature for Image Authentication. IEEE Conf. Image Processing, September 16-19, pp. 227-230. IEEE Signal Processing Society, Lausanne, Switzerland.
-
(1996)
IEEE Conf. Image Processing
, pp. 227-230
-
-
Schneider, M.1
Chang, S.-F.2
-
28
-
-
33750344108
-
Perceptual image hashing via feature points: Performance evaluation and tradeoffs
-
Monga, V. and Evans, B.L. (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEETrans. Image Process, 15, 3453-3466.
-
(2006)
IEEE Trans. Image Process
, vol.15
, pp. 3453-3466
-
-
Monga, V.1
Evans, B.L.2
-
29
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
NewYork, NY, USA, May 31-June 2, ACM
-
Gentry, C. (2009) Fully Homomorphic Encryption Using Ideal Lattices. ACMSymp. Theory of Computing, NewYork, NY, USA, May 31-June 2, pp. 169-178. ACM.
-
(2009)
ACM Symp. Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
30
-
-
0021426851
-
A note on denial-of-service in operating systems
-
Gligor, V.D. (1984) A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng., 10, 320-324.
-
(1984)
IEEE Trans. Softw. Eng.
, vol.10
, pp. 320-324
-
-
Gligor, V.D.1
-
31
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
Peng, T., Leckie, C. and Ramamohanarao, K. (2007) Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv., 39, 1-42.
-
(2007)
ACM Comput. Surv.
, vol.39
, pp. 1-42
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
32
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attacks against web servers
-
New York, NY, USA, October 27-30, ACM
-
Morein,W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V. and Rubenstein, D. (2003) Using Graphic Turing Tests to Counter Automated ddos Attacks Against Web Servers. ACM Conf. Computer and Communications Security, New York, NY, USA, October 27-30, pp. 8-19. ACM.
-
(2003)
ACM Conf. Computer and Communications Security
, pp. 8-19
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
33
-
-
67649889403
-
Flexible deterministic packet marking: An ip traceback system to find the real source of attacks
-
Xiang, Y., Zhou, W. and Guo, M. (2009) Flexible deterministic packet marking: An ip traceback system to find the real source of attacks. IEEE Trans. Parallel Distrib. Syst., 20, 567-580.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
34
-
-
0035440673
-
Simplicity: Semantics-sensitive integrated matching for picture libraries
-
Wang, J.Z., Li, J. and Wiederhold, G. (2001) Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell., 23, 947-963.
-
(2001)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.23
, pp. 947-963
-
-
Wang, J.Z.1
Li, J.2
Wiederhold, G.3
-
35
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T. and Shamoon, T. (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process, 6, 1673-1687.
-
(1997)
IEEE Trans. Image Process
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
36
-
-
0038520452
-
-
JTC1/SC29/WG11, International Strandard. ISO/IEC
-
JTC1/SC29/WG11. (2004) Mpeg-7 overview (version 10). International Strandard. ISO/IEC.
-
(2004)
Mpeg-7 Overview (version 10)
-
-
-
37
-
-
0035365392
-
Color and texture descriptors
-
Manjunath, B.S., Ohm, J.R., Vasudevan, V.V. and Yamada, A. (2001) Color and texture descriptors. IEEE Trans. Circuits Syst. Video Technol., 11, 703-715.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, pp. 703-715
-
-
Manjunath, B.S.1
Ohm, J.R.2
Vasudevan, V.V.3
Yamada, A.4
-
38
-
-
0035308430
-
Performance evaluation in content-based image retrieval: Overview and proposals
-
Muller, H., Muller, W., Squire, D.M., Marchand-Maillet, S. and Pun, T. (2001) Performance evaluation in content-based image retrieval: overview and proposals. Pattern Recognit. Lett., 22, 593-601.
-
(2001)
Pattern Recognit. Lett.
, vol.22
, pp. 593-601
-
-
Muller, H.1
Muller, W.2
Squire, D.M.3
Marchand-Maillet, S.4
Pun, T.5
|