메뉴 건너뛰기




Volumn , Issue , 2015, Pages 417-421

Markov process based retrieval for encrypted JPEG images

Author keywords

Image encryption; Image retrieval; JPEG; Markov process

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; IMAGE PROCESSING; MARKOV PROCESSES; POTASSIUM COMPOUNDS; QUERY PROCESSING; SUPPORT VECTOR MACHINES; VECTORS;

EID: 84961639784     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2015.18     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 7
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • C. Wang, K. Ren, S. Yu, K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data, " INFOCOM, 2012 Proceedings IEEE. IEEE, pp. 451-459, 2012.
    • (2012) INFOCOM, 2012 Proceedings IEEE. IEEE , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4
  • 8
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • Springer Berlin Heidelberg
    • S. Kamara, C. Papamanthou, "Parallel and dynamic searchable symmetric encryption, " In Financial Cryptography and Data Security, FC, pp. 258-274, Springer Berlin Heidelberg, 2013.
    • (2013) Financial Cryptography and Data Security, FC , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 12
    • 84908601709 scopus 로고    scopus 로고
    • Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization
    • W. Lu, A. Varna, and M. Wu. "Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization, " Access, IEEE, 2: 125-141, 2014.
    • (2014) Access, IEEE , vol.2 , pp. 125-141
    • Lu, W.1    Varna, A.2    Wu, M.3
  • 17
    • 84904739914 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted jpeg bitstream
    • Z. Qian, X. Zhang, and S. Wang, "Reversible Data Hiding in Encrypted JPEG Bitstream, " IEEE Transactions on Multimedia. 16 (5): 1486-1491. 2014.
    • (2014) IEEE Transactions on Multimedia. , vol.16 , Issue.5 , pp. 1486-1491
    • Qian, Z.1    Zhang, X.2    Wang, S.3
  • 19
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Springer Berlin Heidelberg
    • Y. Q. Shi, C. Chen, and W. Chen, ''A Markov process based approach to effective attacking JPEG steganography, '' In Information Hiding, Springer Berlin Heidelberg, pp. 249-264, 2007.
    • (2007) Information Hiding , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 21
    • 84961580313 scopus 로고    scopus 로고
    • http://wang. ist. psu. edu/docs/related/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.