IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016
DOI: 10.1109/infocom.2016.7524460
|View full text |Cite
|
Sign up to set email alerts
|

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…In recent years, researchers have extended privacy-preserving information retrieval from search over encrypted text [3-5, 7, 23] to secure multimedia retrieval [8,[24][25][26][27][28][29][30][31].…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, researchers have extended privacy-preserving information retrieval from search over encrypted text [3-5, 7, 23] to secure multimedia retrieval [8,[24][25][26][27][28][29][30][31].…”
Section: Related Workmentioning
confidence: 99%
“…A number of studies proposed cryptography-based solutions for image sharing [7,8], retrieval [9,10], and feature extraction [11,12] using untrusted service providers. While those solutions secure the image data with encryption, they exhibit a few drawbacks which make them inapplicable in our setting.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, the features computed by the untrusted server also need to be protected, such as shape positions and scale-invariant feature transform (SIFT), as those features often disclose sensitive information. Existing studies resort to more expensive cryptographic tools, such as homomorphic encryption and garbled circuit [11], or multiple independent servers [12], which potentially limit the feasibility of extracting complex features and enabling time-critical applications.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noticed that both solutions given in [12] and [13] do not well preserve the performance of the original SIFT features. To overcome this issue, [15] and [16] propose a secure SIFT feature set based on two independent cloud servers. If the complexity of communication with the user is reduced, it assumes that the two servers do not collude.…”
Section: Introductionmentioning
confidence: 99%
“…There is thus a need to extract image signatures that are themselves encrypted. Such an issue was very recently addressed in [21] and by next in [15] [16]. But, these solutions exploit at least two cloud servers when computing signatures with as consequence the increase of already high communication requirements.…”
Section: Introductionmentioning
confidence: 99%