2021
DOI: 10.1007/s10586-021-03404-2
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving content-based image retrieval in edge environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 49 publications
0
2
0
Order By: Relevance
“…Some researches consider using secure multi-party computing technology to realize PCBIR schemes in edge computing environment. Yan et al [14] propose a PCBIR scheme in edge computing environment through data exchange between multiple edge servers, while the scheme must be deployed on a specific number of edge servers, which may lead to problems in the scalability and flexibility. Wang et al [15] propose a secret sharing homomorphism scheme, which divide face feature vector into n shares and store them in n servers respectively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some researches consider using secure multi-party computing technology to realize PCBIR schemes in edge computing environment. Yan et al [14] propose a PCBIR scheme in edge computing environment through data exchange between multiple edge servers, while the scheme must be deployed on a specific number of edge servers, which may lead to problems in the scalability and flexibility. Wang et al [15] propose a secret sharing homomorphism scheme, which divide face feature vector into n shares and store them in n servers respectively.…”
Section: Related Workmentioning
confidence: 99%
“…2) Information entropy Information entropy represents the uncertainty of encrypted features, which is defined as follows: 𝐻𝐻 = βˆ’ οΏ½ 𝑇𝑇(π‘₯π‘₯(𝑖𝑖)) Γ— 𝑇𝑇𝑙𝑙𝐼𝐼 2 𝑇𝑇(π‘₯π‘₯(𝑖𝑖)) 𝑛𝑛 𝑖𝑖=0 (14) where π‘₯π‘₯(𝑖𝑖) is the encrypted feature, 𝐸𝐸 is the length of π‘₯π‘₯(𝑖𝑖), 𝑇𝑇(π‘₯π‘₯(𝑖𝑖)) is the probability of π‘₯π‘₯(𝑖𝑖). The entropy for the index share of the proposed scheme, the encrypted features of three methods proposed by Lu [6], the encrypted features in homomorphism scheme [10], plaintext features and random data are shown in Table 3.…”
Section: Fig 3 Autocorrelation Function Of Encrypted Featuresmentioning
confidence: 99%