-
1
-
-
35048901123
-
Public key encryption with keyword search
-
Berlin, Germany: Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Advances in Cryptology-EUROCRYPT. Berlin, Germany: Springer, 2004, pp. 506-522.
-
(2004)
Advances in Cryptology-EUROCRYPT.
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
2
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
May
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Security Privacy, May 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
4
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
5
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor networks," J. Internet Technol., vol. 16, no. 1, pp. 171-178, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
6
-
-
84864234736
-
Efficient similarity search over encrypted data
-
Apr.
-
M. Kuzu, M. S. Islam, and M. Kantarcioglu, "Efficient similarity search over encrypted data," in Proc. IEEE 28th Int. Conf. Data Eng., Apr. 2012, pp. 1156-1167.
-
(2012)
Proc. IEEE 28th Int. Conf. Data Eng.
, pp. 1156-1167
-
-
Kuzu, M.1
Islam, M.S.2
Kantarcioglu, M.3
-
7
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
Mar.
-
C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in Proc. IEEE INFOCOM, Mar. 2012, pp. 451-459.
-
(2012)
Proc. IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
8
-
-
85006117081
-
Secure semantic expansion based search over encrypted cloud data supporting similarity ranking
-
Z. Xia, Y. Zhu, X. Sun, and L. Chen, "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking," J. Cloud Comput., vol. 3, no. 1, pp. 1-11, 2014.
-
(2014)
J. Cloud Comput.
, vol.3
, Issue.1
, pp. 1-11
-
-
Xia, Z.1
Zhu, Y.2
Sun, X.3
Chen, L.4
-
9
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
10
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Trans. Commun., vol. 98, no. 1, pp. 190-200, 2015.
-
(2015)
IEICE Trans. Commun.
, vol.98
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
11
-
-
84973870160
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
to be published
-
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published.
-
IEEE Trans. Parallel Distrib. Syst.
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
12
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
13
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
Berlin, Germany: Springer
-
S. Kamara and C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," in Financial Cryptography and Data Security. Berlin, Germany: Springer, 2013, pp. 258-274.
-
(2013)
Financial Cryptography and Data Security.
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
14
-
-
85178119595
-
Dynamic searchable encryption in very-large databases: Data structures and implementation
-
D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," in Proc. Netw. Distrib. Syst. Security Symp., 2014, pp. 1-16.
-
(2014)
Proc. Netw. Distrib. Syst. Security Symp.
, pp. 1-16
-
-
Cash, D.1
-
15
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
16
-
-
51949104977
-
Private content based image retrieval
-
Jun.
-
J. Shashank, P. Kowshik, K. Srinathan, and C. V. Jawahar, "Private content based image retrieval," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2008, pp. 1-8.
-
(2008)
Proc. IEEE Conf. Comput. Vis. Pattern Recognit.
, pp. 1-8
-
-
Shashank, J.1
Kowshik, P.2
Srinathan, K.3
Jawahar, C.V.4
-
17
-
-
72449155569
-
Secure and robust SIFT
-
C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, "Secure and robust SIFT," in Proc. 17th ACM Int. Conf. Multimedia, 2009, pp. 637-640.
-
(2009)
Proc. 17th ACM Int. Conf. Multimedia
, pp. 637-640
-
-
Hsu, C.-Y.1
Lu, C.-S.2
Pei, S.-C.3
-
18
-
-
84867864555
-
Image feature extraction in encrypted domain with privacy-preserving SIFT
-
Nov.
-
C. Y. Hsu, C. S. Lu, and S. C. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT," IEEE Trans. Image Process., vol. 21, no. 11, pp. 4593-4607, Nov. 2012.
-
(2012)
IEEE Trans. Image Process.
, vol.21
, Issue.11
, pp. 4593-4607
-
-
Hsu, C.Y.1
Lu, C.S.2
Pei, S.C.3
-
19
-
-
84887421374
-
An efficient image homomorphic encryption scheme with small ciphertext expansion
-
P. Zheng and J. Huang, "An efficient image homomorphic encryption scheme with small ciphertext expansion," in Proc. 21st ACM Int. Conf. Multimedia, 2013, pp. 803-812.
-
(2013)
Proc. 21st ACM Int. Conf. Multimedia
, pp. 803-812
-
-
Zheng, P.1
Huang, J.2
-
20
-
-
84913536910
-
Towards efficient privacy-preserving image feature extraction in cloud computing
-
Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, "Towards efficient privacy-preserving image feature extraction in cloud computing," in Proc. 22nd ACM Int. Conf. Multimedia, 2014, pp. 497-506.
-
(2014)
Proc. 22nd ACM Int. Conf. Multimedia
, pp. 497-506
-
-
Qin, Z.1
Yan, J.2
Ren, K.3
Chen, C.W.4
Wang, C.5
-
21
-
-
84904903882
-
Steganalysis of least significant bit matching using multi-order differences
-
Aug.
-
Z. Xia, X. Wang, X. Sun, and B. Wang, "Steganalysis of least significant bit matching using multi-order differences," Security Commun. Netw., vol. 7, no. 8, pp. 1283-1291, Aug. 2014.
-
(2014)
Security Commun. Netw.
, vol.7
, Issue.8
, pp. 1283-1291
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, B.4
-
22
-
-
71449083267
-
Enabling search over encrypted multimedia databases
-
Feb.
-
W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, "Enabling search over encrypted multimedia databases," Proc. SPIE, vol. 7254, p. 725418, Feb. 2009.
-
(2009)
Proc. SPIE
, vol.7254
, pp. 725418
-
-
Lu, W.1
Swaminathan, A.2
Varna, A.L.3
Wu, M.4
-
23
-
-
70349216521
-
Secure image retrieval through feature protection
-
Apr.
-
W. Lu, A. L. Varna, A. Swaminathan, and M. Wu, "Secure image retrieval through feature protection," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., Apr. 2009, pp. 1533-1536.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.L.2
Swaminathan, A.3
Wu, M.4
-
24
-
-
84924420380
-
Secure index construction for privacy-preserving large-scale image retrieval
-
Dec.
-
B. Cheng, L. Zhuo, Y. Bai, Y. Peng, and J. Zhang, "Secure index construction for privacy-preserving large-scale image retrieval," in Proc. IEEE 4th Int. Conf. Big Data Cloud Comput., Dec. 2014, pp. 116-120.
-
(2014)
Proc. IEEE 4th Int. Conf. Big Data Cloud Comput.
, pp. 116-120
-
-
Cheng, B.1
Zhuo, L.2
Bai, Y.3
Peng, Y.4
Zhang, J.5
-
25
-
-
85032613257
-
Towards privacy-preserving content-based image retrieval in cloud computing
-
to be published
-
Z. Xia, Y. Zhu, X. Sun, Z. Qin, and K. Ren, "Towards privacy-preserving content-based image retrieval in cloud computing," IEEE Trans. Cloud Comput., to be published.
-
IEEE Trans. Cloud Comput.
-
-
Xia, Z.1
Zhu, Y.2
Sun, X.3
Qin, Z.4
Ren, K.5
-
27
-
-
84961639784
-
Markov process based retrieval for encrypted JPEG images
-
Aug.
-
H. Cheng, X. Zhang, J. Yu, and F. Li, "Markov process based retrieval for encrypted JPEG images," in Proc. IEEE 10th Int. Conf. Availability, Rel. Security, Aug. 2015, pp. 417-421.
-
(2015)
Proc. IEEE 10th Int. Conf. Availability, Rel. Security
, pp. 417-421
-
-
Cheng, H.1
Zhang, X.2
Yu, J.3
Li, F.4
-
28
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr.
-
N. Memon and P. W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
29
-
-
0036565541
-
Managing copyright in open networks
-
May/Jun.
-
A. Piva, F. Bartolini, and M. Barni, "Managing copyright in open networks," IEEE Internet Comput., vol. 6, no. 3, pp. 18-26, May/Jun. 2002.
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.3
, pp. 18-26
-
-
Piva, A.1
Bartolini, F.2
Barni, M.3
-
30
-
-
56749170420
-
A buyer-seller watermarking protocol based on secure embedding
-
Dec.
-
S. Katzenbeisser, A. Lemma, M. U. Celik, M. van der Veen, and M. Maas, "A buyer-seller watermarking protocol based on secure embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 783-786, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 783-786
-
-
Katzenbeisser, S.1
Lemma, A.2
Celik, M.U.3
Veen Der Van, M.4
Maas, M.5
-
31
-
-
70449671086
-
An efficient buyer-seller watermarking protocol based on composite signal representation
-
M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," in Proc. 11th ACM Workshop Multimedia Security, 2009, pp. 9-18.
-
(2009)
Proc. 11th ACM Workshop Multimedia Security
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
32
-
-
78649400346
-
A provably secure anonymous buyer-seller watermarking protocol
-
Dec.
-
A. Rial, M. Deng, T. Bianchi, A. Piva, and B. Preneel, "A provably secure anonymous buyer-seller watermarking protocol," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 920-931, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 920-931
-
-
Rial, A.1
Deng, M.2
Bianchi, T.3
Piva, A.4
Preneel, B.5
-
33
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security
, pp. 71-82
-
-
Sun, W.1
-
34
-
-
0035365392
-
Color and texture descriptors
-
Jun.
-
B. S. Manjunath, J.-R. Ohm, V. V. Vasudevan, and A. Yamada, "Color and texture descriptors," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 6, pp. 703-715, Jun. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.6
, pp. 703-715
-
-
Manjunath, B.S.1
Ohm, J.-R.2
Vasudevan, V.V.3
Yamada, A.4
-
35
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. 20th Annu. Symp. Comput. Geometry, 2004, pp. 253-262.
-
(2004)
Proc. 20th Annu. Symp. Comput. Geometry
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
36
-
-
85032752211
-
Privacy-preserving nearest neighbor methods: Comparing signals without revealing them
-
Mar.
-
S. Rane and P. T. Boufounos, "Privacy-preserving nearest neighbor methods: Comparing signals without revealing them," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 18-28, Mar. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.2
, pp. 18-28
-
-
Rane, S.1
Boufounos, P.T.2
-
37
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
38
-
-
33751435956
-
Commutative watermarking and encryption for media data
-
S. Lian, Z. Liu, R. Zhen, and H. Wang, "Commutative watermarking and encryption for media data," Opt. Eng., vol. 45, no. 8, p. 080510, 2006.
-
(2006)
Opt. Eng.
, vol.45
, Issue.8
, pp. 080510
-
-
Lian, S.1
Liu, Z.2
Zhen, R.3
Wang, H.4
-
39
-
-
42949150164
-
A joint digital watermarking and encryption method
-
Feb.
-
M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. De Natale, and A. Neri, "A joint digital watermarking and encryption method," Proc. SPIE, vol. 6819, p. 68191C, Feb. 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 68191C
-
-
Cancellaro, M.1
Battisti, F.2
Carli, M.3
Boato, G.4
De Natale, F.G.B.5
Neri, A.6
-
40
-
-
78651086488
-
A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
-
M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. De Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process., Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
-
(2011)
Signal Process., Image Commun.
, vol.26
, Issue.1
, pp. 1-12
-
-
Cancellaro, M.1
Battisti, F.2
Carli, M.3
Boato, G.4
De Natale, F.G.B.5
Neri, A.6
-
41
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
Berlin, Germany: Springer
-
A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen, "Secure watermark embedding through partial encryption," in Digital Watermarking. Berlin, Germany: Springer, 2006, pp. 433-445.
-
(2006)
Digital Watermarking.
, pp. 433-445
-
-
Lemma, A.1
Katzenbeisser, S.2
Celik, M.3
Veen Der Van, M.4
-
42
-
-
80053559396
-
Secure image retrieval based on visual content and watermarking protocol
-
J. Zhang, Y. Xiang, W. Zhou, L. Ye, and Y. Mu, "Secure image retrieval based on visual content and watermarking protocol," Comput. J., vol. 54, no. 10, pp. 1661-1674, 2011.
-
(2011)
Comput. J.
, vol.54
, Issue.10
, pp. 1661-1674
-
-
Zhang, J.1
Xiang, Y.2
Zhou, W.3
Ye, L.4
Mu, Y.5
-
43
-
-
85032751187
-
Secure watermarking for multimedia content protection: A review of its benefits and open issues
-
Mar.
-
T. Bianchi and A. Piva, "Secure watermarking for multimedia content protection: A review of its benefits and open issues," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 87-96, Mar. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.2
, pp. 87-96
-
-
Bianchi, T.1
Piva, A.2
-
44
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
Sep.
-
M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen, "Lookup-table-based secure client-side embedding for spread-spectrum watermarks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 475-487, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.U.1
Lemma, A.N.2
Katzenbeisser, S.3
Veen Der Van, M.4
-
45
-
-
77249113281
-
Secure client-side ST-DM watermark embedding
-
Mar.
-
A. Piva, T. Bianchi, and A. De Rosa, "Secure client-side ST-DM watermark embedding," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 13-26, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 13-26
-
-
Piva, A.1
Bianchi, T.2
De Rosa, A.3
-
46
-
-
79952179059
-
Reversible data hiding in encrypted image
-
Apr.
-
X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
-
(2011)
IEEE Signal Process. Lett.
, vol.18
, Issue.4
, pp. 255-258
-
-
Zhang, X.1
-
47
-
-
84986594417
-
-
accessed on Nov. 29, 2015. [Online]
-
(2015). Streamcipher, accessed on Nov. 29, 2015. [Online]. Available: https://en.wikipedia.org/wiki/Streaming-cipher
-
(2015)
Streamcipher
-
-
-
48
-
-
0035472066
-
Protocols for watermark verification
-
Oct./Dec.
-
K. Gopalakrishnan, N. Memon, and P. L. Vora, "Protocols for watermark verification," IEEE Multimedia Mag., vol. 8, no. 4, pp. 66-70, Oct./Dec. 2001.
-
(2001)
IEEE Multimedia Mag.
, vol.8
, Issue.4
, pp. 66-70
-
-
Gopalakrishnan, K.1
Memon, N.2
Vora, P.L.3
-
49
-
-
9744242854
-
An efficient and anonymous buyer-seller watermarking protocol
-
Dec.
-
C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, "An efficient and anonymous buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618-1626, Dec. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1618-1626
-
-
Lei, C.-L.1
Yu, P.-L.2
Tsai, P.-L.3
Chan, M.-H.4
-
50
-
-
84959136299
-
Steganalysis of LSB matching using differences between nonadjacent pixels
-
Feb.
-
Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, "Steganalysis of LSB matching using differences between nonadjacent pixels," Multimedia Tools Appl., vol. 75, no. 4, pp. 1947-1962, Feb. 2016.
-
(2016)
Multimedia Tools Appl.
, vol.75
, Issue.4
, pp. 1947-1962
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Liu, Q.4
Xiong, N.5
-
51
-
-
0035440673
-
SIMPLIcity: Semantics-sensitive integrated matching for picture libraries
-
Sep.
-
J. Z. Wang, J. Li, and G. Wiederhold, "SIMPLIcity: Semantics-sensitive integrated matching for picture libraries," IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 9, pp. 947-963, Sep. 2001.
-
(2001)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.23
, Issue.9
, pp. 947-963
-
-
Wang, J.Z.1
Li, J.2
Wiederhold, G.3
-
52
-
-
0035308430
-
Performance evaluation in content-based image retrieval: Overview and proposals
-
H. Müller, W. Müller, D. M. Squire, S. Marchand-Maillet, and T. Pun, "Performance evaluation in content-based image retrieval: Overview and proposals," Pattern Recognit. Lett., vol. 22, no. 5, pp. 593-601, 2001.
-
(2001)
Pattern Recognit. Lett.
, vol.22
, Issue.5
, pp. 593-601
-
-
Müller, H.1
Müller, W.2
Squire, D.M.3
Marchand-Maillet, S.4
Pun, T.5
|