2018
DOI: 10.1177/1550147718761814
|View full text |Cite
|
Sign up to set email alerts
|

Efficient encrypted image retrieval in IoT-cloud with multi-user authentication

Abstract: Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions may not be used in smart devices in IoT-cloud because such solutions are not lightweight. In this article, we present a lightweight scheme that can enable a content-based search through encrypted images. In particular, images are represented using local features. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 30 publications
0
19
0
Order By: Relevance
“…Some of these studies use aggregation of feature vectors as in [16] to improve the accuracy by gathering more information about an image. The encryption mechanism in [17, 18] is based on hashing functions, while secure ASPE is employed in [16], and OPE is used in our work.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some of these studies use aggregation of feature vectors as in [16] to improve the accuracy by gathering more information about an image. The encryption mechanism in [17, 18] is based on hashing functions, while secure ASPE is employed in [16], and OPE is used in our work.…”
Section: Resultsmentioning
confidence: 99%
“…Construction of the BOVW is done using various clustering methods. Authors of [17, 18] use the LSH technique in BOVW creation. On the other hand, in [16], a balanced binary clustering technique (BBC) is used to construct the index tree.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…[1][2][3] Through these mobile sensors, users can connect directly to the Internet and conveniently store and collect massive image data from various sources. 4 Moreover, these special mobile sensors, for example, smart phones and tablets, have friendly human-computer interface where users can easily control the mobile sensors by touching or sketching on the screen, well suited even for who are not computer savvy. Therefore, sketching has become easy and ubiquitous, and we can sketch on different kinds of mobile sensors, such as sketching on the mobile phones and cameras even on the smart watches.…”
Section: Introductionmentioning
confidence: 99%
“…On cloud server, the image search is performed, thus helps in reducing the cost for the end user. Another encrypted image retrieval system in IoT with multi-user authentication is proposed by [21]. This system is lightweight, enabling content-based search through decrypted images.…”
mentioning
confidence: 99%