메뉴 건너뛰기




Volumn , Issue , 2014, Pages 710-715

Privacy-preserving outsourcing of image global feature detection

Author keywords

[No Author keywords available]

Indexed keywords

FEATURE EXTRACTION; LAWS AND LEGISLATION; MOTION PICTURE EXPERTS GROUP STANDARDS; PRIVACY-PRESERVING TECHNIQUES;

EID: 84988239854     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2014.7036891     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 1
    • 85018718255 scopus 로고    scopus 로고
    • SSDs boost instagram's speed on amazon EC2
    • 21 Sep.
    • S. Lawson, "SSDs boost instagram's speed on amazon EC2," Computer World, Web. 21 Sep. 2012
    • (2012) Computer World, Web
    • Lawson, S.1
  • 2
    • 84892743636 scopus 로고    scopus 로고
    • NSA prism program taps in to user data of apple, google and others
    • G. Greenwald, and E. MacAskill, "NSA prism program taps in to user data of apple, google and others," The Guardian, 7. 6(2013): 1-43
    • (2013) The Guardian , vol.7 , Issue.6 , pp. 1-43
    • Greenwald, G.1    Macaskill, E.2
  • 3
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • C. Wang, et al. "Toward secure and dependable storage services in cloud computing," IEEE Trans. Services Computing, 5. 2(2012): 220-232
    • (2012) IEEE Trans. Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1
  • 4
    • 70349216521 scopus 로고    scopus 로고
    • Secure image retrieval through feature protection
    • W. Lu, et al., "Secure image retrieval through feature protection," in Proc. Of ICASSP' 09, 2009
    • (2009) Proc. Of ICASSP' 09
    • Lu, W.1
  • 5
    • 84867864555 scopus 로고    scopus 로고
    • Image feature extraction in encrypted domain with privacy-preserving sift
    • C.-Y. Hsu, et al. "Image feature extraction in encrypted domain with privacy-preserving sift," IEEE Trans. Image Processing, 21. 11(2012): 4593-4607
    • (2012) IEEE Trans. Image Processing , vol.21 , Issue.11 , pp. 4593-4607
    • Hsu, C.-Y.1
  • 6
    • 85184652601 scopus 로고    scopus 로고
    • Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
    • C.-Y. Hsu, et al. "Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction," in Proc. Of SPIE'11, 2011
    • (2011) Proc. Of SPIE'11
    • Hsu, C.-Y.1
  • 7
    • 84866038046 scopus 로고    scopus 로고
    • Can homomorphic encryption be practical
    • M. Naehrig, et al. "Can homomorphic encryption be practical" in Proc. Of CCSW'11, 2011
    • (2011) Proc. Of CCSW'11
    • Naehrig, M.1
  • 8
    • 0035364996 scopus 로고    scopus 로고
    • The mpeg-7 visual standard for content description-an overview
    • T. Sikora, "The mpeg-7 visual standard for content description-an overview," IEEE Trans. CSVT, 11. 6(2001): 696-702
    • (2001) IEEE Trans. CSVT , vol.11 , Issue.6 , pp. 696-702
    • Sikora, T.1
  • 9
    • 84858019637 scopus 로고    scopus 로고
    • Features for art painting classification based on vector quantization of mpeg-7 descriptors
    • Springer
    • K. Ivanova, et al. "Features for art painting classification based on vector quantization of mpeg-7 descriptors," Data Engineering and Management, Springer, pp. 146-153, 2012
    • (2012) Data Engineering and Management , pp. 146-153
    • Ivanova, K.1
  • 10
    • 74849111171 scopus 로고    scopus 로고
    • Encrypted domain dct based on homomorphic cryptosystems
    • T. Bianchi, et al. "Encrypted domain dct based on homomorphic cryptosystems," EURASIP Journal on Information Security, 2009(2009): 1-1
    • (2009) EURASIP Journal on Information Security , vol.2009 , pp. 1-1
    • Bianchi, T.1
  • 11
    • 79951793525 scopus 로고    scopus 로고
    • Better key sizes (and attacks) for lwe-based encryption
    • Springer
    • R. Lindner, and C. Peikert, "Better key sizes (and attacks) for lwe-based encryption," Topics in Cryptology-CT-RSA 2011, Springer, pp. 319-339, 2011
    • (2011) Topics in Cryptology-CT-RSA 2011 , pp. 319-339
    • Lindner, R.1    Peikert, C.2
  • 12
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on gaussian measures
    • D. Micciancio, and O. Regev, "Worst-case to average-case reductions based on gaussian measures," SIAM Journal on Computing, 37. 1(2007): 267-302
    • (2007) SIAM Journal on Computing , vol.37 , Issue.1 , pp. 267-302
    • Micciancio, D.1    Regev, O.2
  • 13
    • 34948904828 scopus 로고    scopus 로고
    • Technical Report. California Institute of Technology
    • G. Griffin, et al. "Caltech-256 object category dataset," Technical Report. California Institute of Technology, 2007
    • (2007) Caltech-256 Object Category Dataset
    • Griffin, G.1
  • 14
    • 24644464493 scopus 로고    scopus 로고
    • PCA-SIFT: A more distinctive representation for local image descriptors
    • Y. Ke and R. Sukthankar, "PCA-SIFT: A more distinctive representation for local image descriptors," in Proc. Of CVPR'04, 2004
    • (2004) Proc. Of CVPR'04
    • Ke, Y.1    Sukthankar, R.2
  • 15
    • 84889051084 scopus 로고    scopus 로고
    • Packed homomorphic encryption based on ideal lattices and its application to biometrics
    • Springer
    • M. Yasuda, et al. "Packed homomorphic encryption based on ideal lattices and its application to biometrics," in Security Engineering and Intelligence Informatics, Springer, pp. 55-74, 2013
    • (2013) Security Engineering and Intelligence Informatics , pp. 55-74
    • Yasuda, M.1
  • 16
    • 85184625768 scopus 로고    scopus 로고
    • Enabling search over encrypted multimedia databases
    • W. Lu, et al. "Enabling search over encrypted multimedia databases," in Proc. Of SPIE'09, 2009
    • (2009) Proc. Of SPIE'09
    • Lu, W.1
  • 17
    • 85032751316 scopus 로고    scopus 로고
    • Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
    • J. Bringer, et al. "Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends," Signal Processing Magazine, 30. 2(2013): 42-52.
    • (2013) Signal Processing Magazine , vol.30 , Issue.2 , pp. 42-52
    • Bringer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.