메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 308-317

POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices

Author keywords

Photo Privacy; Privacy preserving Photo Searching

Indexed keywords

DATA PRIVACY; IMAGE ANALYSIS; INTERNET PROTOCOLS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; USER EXPERIENCE;

EID: 84944317130     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2015.39     Document Type: Conference Paper
Times cited : (65)

References (33)
  • 2
    • 43049174575 scopus 로고    scopus 로고
    • Speeded-up robust features (surf)
    • H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, "Speeded-up robust features (surf)," CVIU, vol. 110, No. 3, pp. 346-359, 2008
    • (2008) CVIU , vol.110 , Issue.3 , pp. 346-359
    • Bay, H.1    Ess, A.2    Tuytelaars, T.3    Van Gool, L.4
  • 3
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • IEEE
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in S&P. IEEE, 2007, pp. 321-334
    • (2007) S&P , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 4
    • 84914165766 scopus 로고    scopus 로고
    • Privacy tag: Privacy concern expressed and respected
    • ACM
    • C. Bo, G. Shen, J. Liu, X.-Y. Li, Y. Zhang, and F. Zhao, "Privacy. tag: Privacy concern expressed and respected," in SenSys. ACM, 2014
    • (2014) SenSys
    • Bo, C.1    Shen, G.2    Liu, J.3    Li, X.-Y.4    Zhang, Y.5    Zhao, F.6
  • 5
    • 79952521625 scopus 로고    scopus 로고
    • Brief: Binary robust independent elementary features
    • M. Calonder, V. Lepetit, C. Strecha, and P. Fua, "Brief: Binary robust independent elementary features," in ECCV, 2010
    • (2010) ECCV
    • Calonder, M.1    Lepetit, V.2    Strecha, C.3    Fua, P.4
  • 6
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable adaptive oblivious transfer
    • Springer
    • J. Camenisch, G. Neven et al., "Simulatable adaptive oblivious transfer," in EUROCRYPT. Springer, 2007, pp. 573-590
    • (2007) EUROCRYPT , pp. 573-590
    • Camenisch, J.1    Neven, G.2
  • 7
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multiauthority attribute-based encryption
    • ACM
    • M. Chase and S. S. Chow, "Improving privacy and security in multiauthority attribute-based encryption," in CCS. ACM, 2009
    • (2009) CCS
    • Chase, M.1    Chow, S.S.2
  • 8
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • ACM
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in CCS. ACM, 2006
    • (2006) CCS
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 10
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices." in STOC, vol. 9, 2009, pp. 169-178
    • (2009) STOC , vol.9 , pp. 169-178
    • Gentry, C.1
  • 12
    • 70449560133 scopus 로고    scopus 로고
    • Hamming embedding and weak geometric consistency for large scale image search
    • H. Jegou, M. Douze, and C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in ECCV, 2008
    • (2008) ECCV
    • Jegou, H.1    Douze, M.2    Schmid, C.3
  • 13
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-authorities
    • IEEE
    • T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities," in INFOCOM. IEEE, 2013
    • (2013) INFOCOM
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4
  • 14
    • 33744792263 scopus 로고    scopus 로고
    • Pedestrian detection in crowded scenes
    • IEEE
    • B. Leibe, E. Seemann, and B. Schiele, "Pedestrian detection in crowded scenes," in CVPR. IEEE, 2005
    • (2005) CVPR
    • Leibe, B.1    Seemann, E.2    Schiele, B.3
  • 15
    • 84866351451 scopus 로고    scopus 로고
    • Toward privacy-assured cloud data services with flexible search functionalities
    • IEEE
    • M. Li, S. Yu, W. Lou, and Y. T. Hou, "Toward privacy-assured cloud data services with flexible search functionalities," in ICDCSW. IEEE, 2012
    • (2012) ICDCSW
    • Li, M.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 16
    • 0032209062 scopus 로고    scopus 로고
    • Feature detection with automatic scale selection
    • T. Lindeberg, "Feature detection with automatic scale selection," IJCV, vol. 30, No. 2, pp. 79-116, 1998
    • (1998) IJCV , vol.30 , Issue.2 , pp. 79-116
    • Lindeberg, T.1
  • 17
    • 24744472288 scopus 로고    scopus 로고
    • A proof of yao's protocol for secure two-party computation
    • Y. Lindell and B. Pinkas, "A proof of yao's protocol for secure two-party computation." IACR Cryptology ePrint Archive, p. 175, 2004
    • (2004) IACR Cryptology EPrint Archive , pp. 175
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 3042535216 scopus 로고    scopus 로고
    • Distinctive image features from scale-invariant keypoints
    • D. G. Lowe, "Distinctive image features from scale-invariant keypoints," IJCV, vol. 60, No. 2, pp. 91-110, 2004
    • (2004) IJCV , vol.60 , Issue.2 , pp. 91-110
    • Lowe, D.G.1
  • 21
    • 9644260534 scopus 로고    scopus 로고
    • Scale & affine invariant interest point detectors
    • K. Mikolajczyk and C. Schmid, "Scale & affine invariant interest point detectors," IJCV, vol. 60, No. 1, pp. 63-86, 2004
    • (2004) IJCV , vol.60 , Issue.1 , pp. 63-86
    • Mikolajczyk, K.1    Schmid, C.2
  • 22
    • 70349675925 scopus 로고    scopus 로고
    • Fast approximate nearest neighbors with automatic algorithm configuration
    • M. Muja and D. G. Lowe, "Fast approximate nearest neighbors with automatic algorithm configuration." in VISAPP (1), 2009, pp. 331-340
    • (2009) VISAPP , Issue.1 , pp. 331-340
    • Muja, M.1    Lowe, D.G.2
  • 23
    • 36048948044 scopus 로고    scopus 로고
    • A privacy-preserving technique for euclidean distance-based mining algorithms using fourierrelated transforms
    • S. Mukherjee, Z. Chen, and A. Gangopadhyay, "A privacy-preserving technique for euclidean distance-based mining algorithms using fourierrelated transforms," VLDB Journal, vol. 15, No. 4, pp. 293-315, 2006
    • (2006) VLDB Journal , vol.15 , Issue.4 , pp. 293-315
    • Mukherjee, S.1    Chen, Z.2    Gangopadhyay, A.3
  • 24
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT. Springer, 1999, pp. 223-238
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 25
    • 80052275017 scopus 로고    scopus 로고
    • Binary sift: Fast image retrieval using binary quantized sift features
    • K. Peker, "Binary sift: Fast image retrieval using binary quantized sift features," in CBMI, 2011
    • (2011) CBMI
    • Peker, K.1
  • 26
    • 85076695685 scopus 로고    scopus 로고
    • P3: Toward privacy-preserving photo sharing
    • USENIX
    • M.-R. Ra, R. Govindan, and A. Ortega, "P3: Toward privacy-preserving photo sharing," in NSDI. USENIX, 2013
    • (2013) NSDI
    • Ra, M.-R.1    Govindan, R.2    Ortega, A.3
  • 27
    • 84949922298 scopus 로고    scopus 로고
    • Privacy-preserving ranked multikeyword search leveraging polynomial function in cloud computing
    • IEEE
    • Y. Ren, Y. Chen, J. Yang, and B. Xie, "Privacy-preserving ranked multikeyword search leveraging polynomial function in cloud computing," in Globecom. IEEE, 2014
    • (2014) Globecom
    • Ren, Y.1    Chen, Y.2    Yang, J.3    Xie, B.4
  • 32
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • IEEE
    • B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in CLOUD. IEEE, 2012
    • (2012) CLOUD
    • Wang, B.1    Li, B.2    Li, H.3
  • 33
    • 84883129081 scopus 로고    scopus 로고
    • Verifiable private multi-party computation: Ranging and ranking
    • IEEE
    • L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multi-party computation: ranging and ranking," in INFOCOM. IEEE, 2013
    • (2013) INFOCOM
    • Zhang, L.1    Li, X.-Y.2    Liu, Y.3    Jung, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.