2020 28th European Signal Processing Conference (EUSIPCO) 2021
DOI: 10.23919/eusipco47968.2020.9287671
|View full text |Cite
|
Sign up to set email alerts
|

A Content-based Image Retrieval Scheme Using Compressible Encrypted Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Privacy-preserving image retrieval applications: The CPE scheme's cipher images preserve the image local contents on a block level; this information can be exploited for image retrieval applications without revealing the visual information of the image, as demonstrated in [57][58][59][60]. To achieve security, they used a Color CPE scheme with the JPEG and JPEG-LS standards.…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
“…Privacy-preserving image retrieval applications: The CPE scheme's cipher images preserve the image local contents on a block level; this information can be exploited for image retrieval applications without revealing the visual information of the image, as demonstrated in [57][58][59][60]. To achieve security, they used a Color CPE scheme with the JPEG and JPEG-LS standards.…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
“…The Encryption alongside Compression methodology was proffered by [11] for retrieving images safely.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the second approach, descriptors are directly extracted from encrypted images by a cloud provider as well as for plain images [12]- [17], where each data owner only encrypts images. In addition, data owners and users do not need to share keys.…”
Section: ) Generating Descriptors From Encrypted Imagesmentioning
confidence: 99%
“…The proposed retrieval scheme corresponds to this approach. Schemes [12]- [17] are carried out the basis on this approach. Some schemes [15], [16] consider compressing images with JPEG, but their retrieval performance will be degraded due to the difference in coding parameters used for JPEG compression.…”
Section: ) Generating Descriptors From Encrypted Imagesmentioning
confidence: 99%
See 1 more Smart Citation