메뉴 건너뛰기




Volumn , Issue , 2014, Pages 497-506

Towards efficient privacy-preserving image feature extraction in cloud computing

Author keywords

Cloud computing; Image feature detection; Privacy preserving; SIFT

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; OBJECT RECOGNITION; UBIQUITOUS COMPUTING;

EID: 84913536910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2647868.2654941     Document Type: Conference Paper
Times cited : (117)

References (32)
  • 4
    • 79957487964 scopus 로고    scopus 로고
    • Privacy-preserving ecg classification with branching programs and neural networks
    • M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider. Privacy-preserving ecg classification with branching programs and neural networks. IEEE TIFS, Vol. 6, No. 2, pp. 452-468, 2011.
    • (2011) IEEE TIFS , vol.6 , Issue.2 , pp. 452-468
    • Barni, M.1    Failla, P.2    Lazzeretti, R.3    Sadeghi, A.4    Schneider, T.5
  • 5
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE TIFS, Vol. 5, No. 1, pp. 180-187, 2010.
    • (2010) IEEE TIFS , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 7
    • 85032751316 scopus 로고    scopus 로고
    • Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
    • J. Bringer, H. Chabanne, and A. Patey. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. Signal Processing Magazine, 2013.
    • (2013) Signal Processing Magazine
    • Bringer, J.1    Chabanne, H.2    Patey, A.3
  • 9
    • 78650862607 scopus 로고    scopus 로고
    • Challenging the security of content-based image retrieval systems
    • T.-T. Do, E. Kijak, T. Furon, and L. Amsaleg. Challenging the security of content-based image retrieval systems. In Proc. of IEEE MMSP, 2010.
    • (2010) Proc. of IEEE MMSP
    • Do, T.-T.1    Kijak, E.2    Furon, T.3    Amsaleg, L.4
  • 12
    • 84867864555 scopus 로고    scopus 로고
    • Image feature extraction in encrypted domain with privacy-preserving sift
    • C.-Y. Hsu, C.-S. Lu, and S.-C. Pei. Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Processing, Vol. 21, No. 11, pp. 4593-4607, 2012.
    • (2012) IEEE Trans. Image Processing , vol.21 , Issue.11 , pp. 4593-4607
    • Hsu, C.-Y.1    Lu, C.-S.2    Pei, S.-C.3
  • 14
    • 79954510617 scopus 로고    scopus 로고
    • Homomorphic encryption-based secure sift for privacy-preserving feature extraction
    • C.-Y. Hsu, C.-S. Lu, and S.-C. Pei. Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In Proc of IEEE SPIE, 2011.
    • (2011) Proc of IEEE SPIE
    • Hsu, C.-Y.1    Lu, C.-S.2    Pei, S.-C.3
  • 15
    • 5044233274 scopus 로고    scopus 로고
    • Pca-sift: A more distinctive representation for local image descriptors
    • Y. Ke and R. Sukthankar. Pca-sift: A more distinctive representation for local image descriptors. In Proc. of IEEE CVPR, 2004.
    • (2004) Proc. of IEEE CVPR
    • Ke, Y.1    Sukthankar, R.2
  • 16
    • 84913542485 scopus 로고    scopus 로고
    • Why johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising
    • P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising. In Proc. of ACM SIGCHI, 2012.
    • (2012) Proc. of ACM SIGCHI
    • Leon, P.1    Ur, B.2    Shay, R.3    Wang, Y.4    Balebako, R.5    Cranor, L.6
  • 17
    • 3042535216 scopus 로고    scopus 로고
    • Distinctive image features from scale-invariant keypoints
    • D. G. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, Vol. 60, No. 2, pp. 31-110, 2004.
    • (2004) International Journal of Computer Vision , vol.60 , Issue.2 , pp. 31-110
    • Lowe, D.G.1
  • 20
    • 84913542483 scopus 로고    scopus 로고
    • Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising
    • M. Malheiros, C. Jennett, S. Patel, S. Brostoff, and M. A. Sasse. Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising. In Proc. of ACM SIGCHI, 2012.
    • (2012) Proc. of ACM SIGCHI
    • Malheiros, M.1    Jennett, C.2    Patel, S.3    Brostoff, S.4    Sasse, M.A.5
  • 21
    • 77956533993 scopus 로고    scopus 로고
    • Illumination invariant representation for privacy preserving face identification
    • B. Moskovich and M. Osadchy. Illumination invariant representation for privacy preserving face identification. In Proc. of IEEE CVPRW, 2010.
    • (2010) Proc. of IEEE CVPRW
    • Moskovich, B.1    Osadchy, M.2
  • 24
    • 84913548523 scopus 로고    scopus 로고
    • Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation
    • S. J. Patel, A. Chouhan, and D. C. Jinwala. Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation. Journal of Information Security, Vol. 5, No. 1, pp. 12-18, 2014.
    • (2014) Journal of Information Security , vol.5 , Issue.1 , pp. 12-18
    • Patel, S.J.1    Chouhan, A.2    Jinwala, D.C.3
  • 28
    • 77955920069 scopus 로고    scopus 로고
    • A new chaos-based fast image encryption algorithm
    • Y. Wang, K.-W. Wong, X. Liao, and G. Chen. A new chaos-based fast image encryption algorithm. Applied soft computing, Vol. 11, No. 1, pp. 514-522 2011.
    • (2011) Applied Soft Computing , vol.11 , Issue.1 , pp. 514-522
    • Wang, Y.1    Wong, K.-W.2    Liao, X.3    Chen, G.4
  • 29
    • 84913542477 scopus 로고    scopus 로고
    • Secure and private outsourcing of shape-based feature extraction
    • S. Wang, M. Nassar, M. Atallah, and Q. Malluhi. Secure and private outsourcing of shape-based feature extraction. In Proc. of ICISC, 2013.
    • (2013) Proc. of ICISC
    • Wang, S.1    Nassar, M.2    Atallah, M.3    Malluhi, Q.4
  • 30
    • 0001772530 scopus 로고
    • Protocols for secure computations
    • A. C.-C. Yao. Protocols for secure computations. In Proc. of IEEE FOCS, 1982.
    • (1982) Proc. of IEEE FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.