메뉴 건너뛰기




Volumn 17, Issue 3, 2015, Pages 146-162

Security and privacy protocols for perceptual image hashing

Author keywords

Authentication; Identification; Perceptual image hashing; Privacy preserving; Security protocols

Indexed keywords

DIGITAL FORENSICS; IMAGE PROCESSING; NETWORK SECURITY; PRIVACY-PRESERVING TECHNIQUES;

EID: 84925695989     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2015.068178     Document Type: Article
Times cited : (7)

References (37)
  • 1
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Desmedt, Y. and Frankel, Y. (1989) 'Threshold cryptosystems', CRYPTO, pp. 307-315.
    • (1989) CRYPTO , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 3
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Goldwasser S. and Micali S. (1984) 'Probabilistic encryption', J. Comput. Syst. Sci., Vol. 28, No. 2, pp. 270-299.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 4
    • 84925747975 scopus 로고    scopus 로고
    • ECRYPT Network of Excellence Technical Report, European Network of Excellence in Cryptology
    • ECRYPT Network of Excellence Technical Report (2006) D.WVL.11: Benchmarking Metrics and Concepts for Perceptual, European Network of Excellence in Cryptology, http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.11-1.0.pdf.
    • (2006) D.WVL.11: Benchmarking Metrics and Concepts for Perceptual
  • 6
    • 79957991215 scopus 로고    scopus 로고
    • Implementing gentry's fullyhomomorphic encryption scheme
    • Gentry, C. and Halevi, S.(2010) 'Implementing gentry's fullyhomomorphic encryption scheme', IACR Cryptology ePrint Archive, Vol. 2010, p.520.
    • (2010) IACR Cryptology ePrint Archive , vol.2010 , pp. 520
    • Gentry, C.1    Halevi, S.2
  • 8
    • 84876044597 scopus 로고    scopus 로고
    • An order-sorted query system for sort, predicate, and meta-predicate hierarchies
    • Kaneiwa, K. and Nguyen, P.H.P. (2013) 'An order-sorted query system for sort, predicate, and meta-predicate hierarchies', Knowl. Inf. Syst., Vol. 35, No. 2, pp. 463-492.
    • (2013) Knowl. Inf. Syst. , vol.35 , Issue.2 , pp. 463-492
    • Kaneiwa, K.1    Nguyen, P.H.P.2
  • 12
    • 84925831573 scopus 로고    scopus 로고
    • (In the Hacker Factor Blog).
    • Krawetz, N. (2011) Looks Like It (In the Hacker Factor Blog), http://www.hackerfactor.com/blog/index.php?/archives/432-Looks-Like-It.html
    • (2011) Looks Like It
    • Krawetz, N.1
  • 13
    • 84925831572 scopus 로고    scopus 로고
    • (In the Hacker Factor Blog).
    • Krawetz, N. (2013) Kind of Like That (In the Hacker Factor Blog), http://hackerfactor.com/blog/index.php?/archives/529-Kindof-like-That.html
    • (2013) Kind of Like That
    • Krawetz, N.1
  • 14
  • 15
    • 33751435956 scopus 로고    scopus 로고
    • Commutative watermarking and encryption for media data
    • August 2006
    • Lian, S.G., Liu, Z.X., Ren, Z. andWang, H.L. (2006) 'Commutative watermarking and encryption for media data', International Journal of Optical Engineering, Vol. 45, No. 8, August, pp. 0805101-0805103 2006.
    • (2006) International Journal of Optical Engineering , vol.45 , Issue.8 , pp. 0805101-0805103
    • Lian, S.G.1    Liu, Z.X.2    Ren, Z.3    Wang, H.L.4
  • 17
    • 70349216521 scopus 로고    scopus 로고
    • Secure image retrieval through feature protection
    • IEEE
    • Lu, W., Varna, A.L., Swaminathan, A. and Wu M. (2009) 'Secure image retrieval through feature protection', ICASSP, IEEE, pp. 1533-1536.
    • (2009) ICASSP , pp. 1533-1536
    • Lu, W.1    Varna, A.L.2    Swaminathan, A.3    Wu, M.4
  • 18
    • 77951834415 scopus 로고    scopus 로고
    • Forensic hash for multimedia information
    • SPIE, 18-20 January, San Jose, CA, USA
    • Lu, W.J., Varna, A.L. and Wu, M. (2010a) 'Forensic hash for multimedia information', Proc. SPIE Media Forensics Security, SPIE, 18-20 January, San Jose, CA, USA, pp. 39-48.
    • (2010) Proc. SPIE Media Forensics Security , pp. 39-48
    • Lu, W.J.1    Varna, A.L.2    Wu, M.3
  • 19
    • 78651068288 scopus 로고    scopus 로고
    • Security analysis for privacy preserving search of multimedia
    • IEEE
    • Lu,W.,Varna, A.L. andWu, M. (2010b) 'Security analysis for privacy preserving search of multimedia', ICIP, IEEE, pp. 2093-2096.
    • (2010) ICIP , pp. 2093-2096
    • Lu, W.1    Varna, A.L.2    Wu, M.3
  • 21
    • 20444464472 scopus 로고    scopus 로고
    • Robust perceptual image hashing using feature points
    • IEEE
    • Monga, V. and Evans, B.L. (2004) 'Robust perceptual image hashing using feature points', ICIP, IEEE, pp. 677-680.
    • (2004) ICIP , pp. 677-680
    • Monga, V.1    Evans, B.L.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', EUROCRYPT, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A. and Adleman L.M. (1978) 'A method for obtaining digital signatures and public-key cryptosystems', Commun. ACM, Vol. 21, No. 2, pp. 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 84876040990 scopus 로고    scopus 로고
    • An efficient conceptbased retrieval model for enhancing text retrieval quality
    • Shehata, S., Karray, F. and Kamel, M.S. (2013) 'An efficient conceptbased retrieval model for enhancing text retrieval quality', Knowl. Inf. Syst., Vol. 35, No. 2, pp. 411-434.
    • (2013) Knowl. Inf. Syst. , vol.35 , Issue.2 , pp. 411-434
    • Shehata, S.1    Karray, F.2    Kamel, M.S.3
  • 25
    • 77649266762 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • Smart, N.P. and Vercauteren, F. (2009) 'Fully homomorphic encryption with relatively small key and ciphertext sizes', IACR Cryptology ePrint Archive, Vol. 2009, p.571.
    • (2009) IACR Cryptology ePrint Archive , vol.2009 , pp. 571
    • Smart, N.P.1    Vercauteren, F.2
  • 28
    • 84894472419 scopus 로고    scopus 로고
    • Robust perceptual image hashing based on ring partition and NMF
    • March
    • Tang, Z.J., Zhang, X.Q. and Zhan, S.C. (2014) 'Robust perceptual image hashing based on ring partition and NMF', IEEE Trans. on Knowledge and Data Engineering, Vol. 26, No. 3, March, pp. 711-724.
    • (2014) IEEE Trans. on Knowledge and Data Engineering , vol.26 , Issue.3 , pp. 711-724
    • Tang, Z.J.1    Zhang, X.Q.2    Zhan, S.C.3
  • 29
    • 84897779960 scopus 로고    scopus 로고
    • The National Science and Technology Council, August
    • The National Science and Technology Council (2006) Biometrics Overview, http://www.biometrics.gov/documents/biooverview.pdf, August.
    • (2006) Biometrics Overview
  • 31
    • 80051752479 scopus 로고    scopus 로고
    • Modeling and analysis of correlated binary fingerprints for content identification
    • September
    • Varna, A. and Wu, M. (2011) 'Modeling and analysis of correlated binary fingerprints for content identification', IEEE Trans. on Info. Forensics and Security, Vol. 6, No. 3, September, pp. 1146-1159.
    • (2011) IEEE Trans. on Info. Forensics and Security , vol.6 , Issue.3 , pp. 1146-1159
    • Varna, A.1    Wu, M.2
  • 34
    • 84925760560 scopus 로고    scopus 로고
    • Wikipedia, the Free Encyclopedia, August accessed on 23 December, 2013
    • Wikipedia (2013) Hamming Distance-Wikipedia, the Free Encyclopedia, http://en.wikipedia.org/wiki/Hamming distance (accessed on 23 December, 2013).
    • (2013) Hamming Distance-Wikipedia
  • 35
    • 84876208459 scopus 로고    scopus 로고
    • Hashing based fast palmprint identification for large-scale databases
    • May
    • Yue, F., Li, B., Yu, M. and Wang, J. (2013) 'Hashing based fast palmprint identification for large-scale databases', IEEE Trans. on Info. Forensics and Security,Vol. 8, No. 5, May, pp. 769-778.
    • (2013) IEEE Trans. on Info. Forensics and Security , vol.8 , Issue.5 , pp. 769-778
    • Yue, F.1    Li, B.2    Yu, M.3    Wang, J.4
  • 37
    • 84872026878 scopus 로고    scopus 로고
    • Robust hashing for image authentication using zernike moments and local features
    • January
    • Zhao,Y.,Wang, S., Zhang, X. andYao, H. (2013) 'Robust hashing for image authentication using zernike moments and local features', IEEE Trans. on Info. Forensics and Security, Vol. 8, No. 1, January, pp. 55-63.
    • (2013) IEEE Trans. on Info. Forensics and Security , vol.8 , Issue.1 , pp. 55-63
    • Zhao, Y.1    Wang, S.2    Zhang, X.3    Yao, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.