2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS) 2015
DOI: 10.1109/srds.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Content-Based Image Retrieval in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(25 citation statements)
references
References 27 publications
0
24
0
1
Order By: Relevance
“…In the second category, Ferreira et al [19] proposed a scheme IES-CBIR that can extract image features from encrypted images. The texture and color features were encrypted separately; the color feature was encrypted by scrambling pixels in HSV color model and the texture feature is encrypted by shuffling rows and columns in images.…”
Section: Related Workmentioning
confidence: 99%
“…In the second category, Ferreira et al [19] proposed a scheme IES-CBIR that can extract image features from encrypted images. The texture and color features were encrypted separately; the color feature was encrypted by scrambling pixels in HSV color model and the texture feature is encrypted by shuffling rows and columns in images.…”
Section: Related Workmentioning
confidence: 99%
“…This solution enables both encrypted storage and searching using CBIR queries while preserving privacy. Encrypted data storage and searching using CBIR queries while preserving privacy but there have key sharing, user access control, and reliability issues [6]. In this work, they propose a privacypreserving content-based image retrieval scheme, which allows the data owner to outsource the image database and CBIR service to the cloud, without revealing the original content of the database to the cloud server.…”
Section: Related Workmentioning
confidence: 99%
“…Such a scenario uses the Private Set Union Cardinality (PSI-CA) and a third-party server. Ferreira et al [17] proposed a system to search encrypted images databases stored on a server maintained by a third-party service provider. Under both [16,17], the server should not know its stored data.…”
Section: Related Workmentioning
confidence: 99%
“…However, such a method assumes that the database is public when such database is supposed to be private. The proposed methods in [16][17][18] are also not suitable for evaluating similarity. These approaches can achieve an exact match, thereby limiting the ability to develop efficient solutions.…”
Section: Related Workmentioning
confidence: 99%