메뉴 건너뛰기




Volumn 11, Issue 11, 2016, Pages 2594-2608

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Author keywords

content based image retrieval; copy deterrence; Searchable encryption; secure kNN; watermark

Indexed keywords

CLOUD COMPUTING; CONTENT BASED RETRIEVAL; CRYPTOGRAPHY; DATA PRIVACY; EFFICIENCY; IMAGE PROCESSING; MEDICAL IMAGING; OUTSOURCING; WATERMARKING;

EID: 84986631527     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2590944     Document Type: Article
Times cited : (687)

References (52)
  • 5
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor networks," J. Internet Technol., vol. 16, no. 1, pp. 171-178, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.1 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Wang, J.4    Lee, S.5
  • 7
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • Mar.
    • C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in Proc. IEEE INFOCOM, Mar. 2012, pp. 451-459.
    • (2012) Proc. IEEE INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4
  • 8
    • 85006117081 scopus 로고    scopus 로고
    • Secure semantic expansion based search over encrypted cloud data supporting similarity ranking
    • Z. Xia, Y. Zhu, X. Sun, and L. Chen, "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking," J. Cloud Comput., vol. 3, no. 1, pp. 1-11, 2014.
    • (2014) J. Cloud Comput. , vol.3 , Issue.1 , pp. 1-11
    • Xia, Z.1    Zhu, Y.2    Sun, X.3    Chen, L.4
  • 9
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Jan.
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 10
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Trans. Commun., vol. 98, no. 1, pp. 190-200, 2015.
    • (2015) IEICE Trans. Commun. , vol.98 , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 11
    • 84973870160 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • to be published
    • Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published.
    • IEEE Trans. Parallel Distrib. Syst.
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 12
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 13
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • Berlin, Germany: Springer
    • S. Kamara and C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," in Financial Cryptography and Data Security. Berlin, Germany: Springer, 2013, pp. 258-274.
    • (2013) Financial Cryptography and Data Security. , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 14
    • 85178119595 scopus 로고    scopus 로고
    • Dynamic searchable encryption in very-large databases: Data structures and implementation
    • D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," in Proc. Netw. Distrib. Syst. Security Symp., 2014, pp. 1-16.
    • (2014) Proc. Netw. Distrib. Syst. Security Symp. , pp. 1-16
    • Cash, D.1
  • 15
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 18
    • 84867864555 scopus 로고    scopus 로고
    • Image feature extraction in encrypted domain with privacy-preserving SIFT
    • Nov.
    • C. Y. Hsu, C. S. Lu, and S. C. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT," IEEE Trans. Image Process., vol. 21, no. 11, pp. 4593-4607, Nov. 2012.
    • (2012) IEEE Trans. Image Process. , vol.21 , Issue.11 , pp. 4593-4607
    • Hsu, C.Y.1    Lu, C.S.2    Pei, S.C.3
  • 19
    • 84887421374 scopus 로고    scopus 로고
    • An efficient image homomorphic encryption scheme with small ciphertext expansion
    • P. Zheng and J. Huang, "An efficient image homomorphic encryption scheme with small ciphertext expansion," in Proc. 21st ACM Int. Conf. Multimedia, 2013, pp. 803-812.
    • (2013) Proc. 21st ACM Int. Conf. Multimedia , pp. 803-812
    • Zheng, P.1    Huang, J.2
  • 20
    • 84913536910 scopus 로고    scopus 로고
    • Towards efficient privacy-preserving image feature extraction in cloud computing
    • Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, "Towards efficient privacy-preserving image feature extraction in cloud computing," in Proc. 22nd ACM Int. Conf. Multimedia, 2014, pp. 497-506.
    • (2014) Proc. 22nd ACM Int. Conf. Multimedia , pp. 497-506
    • Qin, Z.1    Yan, J.2    Ren, K.3    Chen, C.W.4    Wang, C.5
  • 21
    • 84904903882 scopus 로고    scopus 로고
    • Steganalysis of least significant bit matching using multi-order differences
    • Aug.
    • Z. Xia, X. Wang, X. Sun, and B. Wang, "Steganalysis of least significant bit matching using multi-order differences," Security Commun. Netw., vol. 7, no. 8, pp. 1283-1291, Aug. 2014.
    • (2014) Security Commun. Netw. , vol.7 , Issue.8 , pp. 1283-1291
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, B.4
  • 22
    • 71449083267 scopus 로고    scopus 로고
    • Enabling search over encrypted multimedia databases
    • Feb.
    • W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, "Enabling search over encrypted multimedia databases," Proc. SPIE, vol. 7254, p. 725418, Feb. 2009.
    • (2009) Proc. SPIE , vol.7254 , pp. 725418
    • Lu, W.1    Swaminathan, A.2    Varna, A.L.3    Wu, M.4
  • 25
    • 85032613257 scopus 로고    scopus 로고
    • Towards privacy-preserving content-based image retrieval in cloud computing
    • to be published
    • Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, "Towards privacy-preserving content-based image retrieval in cloud computing," IEEE Trans. Cloud Comput., to be published.
    • IEEE Trans. Cloud Comput.
    • Xia, Z.1    Zhu, Y.2    Sun, X.3    Qin, Z.4    Ren, K.5
  • 28
    • 0035307977 scopus 로고    scopus 로고
    • A buyer-seller watermarking protocol
    • Apr.
    • N. Memon and P. W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.4 , pp. 643-649
    • Memon, N.1    Wong, P.W.2
  • 29
    • 0036565541 scopus 로고    scopus 로고
    • Managing copyright in open networks
    • May/Jun.
    • A. Piva, F. Bartolini, and M. Barni, "Managing copyright in open networks," IEEE Internet Comput., vol. 6, no. 3, pp. 18-26, May/Jun. 2002.
    • (2002) IEEE Internet Comput. , vol.6 , Issue.3 , pp. 18-26
    • Piva, A.1    Bartolini, F.2    Barni, M.3
  • 31
  • 33
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 71-82.
    • (2013) Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security , pp. 71-82
    • Sun, W.1
  • 36
    • 85032752211 scopus 로고    scopus 로고
    • Privacy-preserving nearest neighbor methods: Comparing signals without revealing them
    • Mar.
    • S. Rane and P. T. Boufounos, "Privacy-preserving nearest neighbor methods: Comparing signals without revealing them," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 18-28, Mar. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.2 , pp. 18-28
    • Rane, S.1    Boufounos, P.T.2
  • 38
    • 33751435956 scopus 로고    scopus 로고
    • Commutative watermarking and encryption for media data
    • S. Lian, Z. Liu, R. Zhen, and H. Wang, "Commutative watermarking and encryption for media data," Opt. Eng., vol. 45, no. 8, p. 080510, 2006.
    • (2006) Opt. Eng. , vol.45 , Issue.8 , pp. 080510
    • Lian, S.1    Liu, Z.2    Zhen, R.3    Wang, H.4
  • 40
    • 78651086488 scopus 로고    scopus 로고
    • A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
    • M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. De Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process., Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
    • (2011) Signal Process., Image Commun. , vol.26 , Issue.1 , pp. 1-12
    • Cancellaro, M.1    Battisti, F.2    Carli, M.3    Boato, G.4    De Natale, F.G.B.5    Neri, A.6
  • 41
    • 33845398262 scopus 로고    scopus 로고
    • Secure watermark embedding through partial encryption
    • Berlin, Germany: Springer
    • A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, "Secure watermark embedding through partial encryption," in Digital Watermarking. Berlin, Germany: Springer, 2006, pp. 433-445.
    • (2006) Digital Watermarking. , pp. 433-445
    • Lemma, A.1    Katzenbeisser, S.2    Celik, M.3    Veen Der Van, M.4
  • 42
    • 80053559396 scopus 로고    scopus 로고
    • Secure image retrieval based on visual content and watermarking protocol
    • J. Zhang, Y. Xiang, W. Zhou, L. Ye, and Y. Mu, "Secure image retrieval based on visual content and watermarking protocol," Comput. J., vol. 54, no. 10, pp. 1661-1674, 2011.
    • (2011) Comput. J. , vol.54 , Issue.10 , pp. 1661-1674
    • Zhang, J.1    Xiang, Y.2    Zhou, W.3    Ye, L.4    Mu, Y.5
  • 43
    • 85032751187 scopus 로고    scopus 로고
    • Secure watermarking for multimedia content protection: A review of its benefits and open issues
    • Mar.
    • T. Bianchi and A. Piva, "Secure watermarking for multimedia content protection: A review of its benefits and open issues," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 87-96, Mar. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.2 , pp. 87-96
    • Bianchi, T.1    Piva, A.2
  • 44
  • 45
  • 46
    • 79952179059 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted image
    • Apr.
    • X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
    • (2011) IEEE Signal Process. Lett. , vol.18 , Issue.4 , pp. 255-258
    • Zhang, X.1
  • 47
    • 84986594417 scopus 로고    scopus 로고
    • accessed on Nov. 29, 2015. [Online]
    • (2015). Streamcipher, accessed on Nov. 29, 2015. [Online]. Available: https://en.wikipedia.org/wiki/Streaming-cipher
    • (2015) Streamcipher
  • 48
    • 0035472066 scopus 로고    scopus 로고
    • Protocols for watermark verification
    • Oct./Dec.
    • K. Gopalakrishnan, N. Memon, and P. L. Vora, "Protocols for watermark verification," IEEE Multimedia Mag., vol. 8, no. 4, pp. 66-70, Oct./Dec. 2001.
    • (2001) IEEE Multimedia Mag. , vol.8 , Issue.4 , pp. 66-70
    • Gopalakrishnan, K.1    Memon, N.2    Vora, P.L.3
  • 49
    • 9744242854 scopus 로고    scopus 로고
    • An efficient and anonymous buyer-seller watermarking protocol
    • Dec.
    • C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.12 , pp. 1618-1626
    • Lei, C.-L.1    Yu, P.-L.2    Tsai, P.-L.3    Chan, M.-H.4
  • 50
    • 84959136299 scopus 로고    scopus 로고
    • Steganalysis of LSB matching using differences between nonadjacent pixels
    • Feb.
    • Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, "Steganalysis of LSB matching using differences between nonadjacent pixels," Multimedia Tools Appl., vol. 75, no. 4, pp. 1947-1962, Feb. 2016.
    • (2016) Multimedia Tools Appl. , vol.75 , Issue.4 , pp. 1947-1962
    • Xia, Z.1    Wang, X.2    Sun, X.3    Liu, Q.4    Xiong, N.5
  • 51
    • 0035440673 scopus 로고    scopus 로고
    • SIMPLIcity: Semantics-sensitive integrated matching for picture libraries
    • Sep.
    • J. Z. Wang, J. Li, and G. Wiederhold, "SIMPLIcity: Semantics-sensitive integrated matching for picture libraries," IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 9, pp. 947-963, Sep. 2001.
    • (2001) IEEE Trans. Pattern Anal. Mach. Intell. , vol.23 , Issue.9 , pp. 947-963
    • Wang, J.Z.1    Li, J.2    Wiederhold, G.3
  • 52
    • 0035308430 scopus 로고    scopus 로고
    • Performance evaluation in content-based image retrieval: Overview and proposals
    • H. Müller, W. Müller, D. M. Squire, S. Marchand-Maillet, and T. Pun, "Performance evaluation in content-based image retrieval: Overview and proposals," Pattern Recognit. Lett., vol. 22, no. 5, pp. 593-601, 2001.
    • (2001) Pattern Recognit. Lett. , vol.22 , Issue.5 , pp. 593-601
    • Müller, H.1    Müller, W.2    Squire, D.M.3    Marchand-Maillet, S.4    Pun, T.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.