2016
DOI: 10.1109/tkde.2016.2587258
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Outsourced Media Search

Abstract: International audienceThis work proposes a privacy-protection framework for an important application called outsourced media search. This scenario involves a data owner, a client, and an untrusted server, where the owner outsources a search service to the server. Due to lack of trust, the privacy of the client and the owner should be protected. The framework relies on multimedia hashing and symmetric encryption. It requires involved parties to participate in a privacy-enhancing protocol. Additional processing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 39 publications
0
23
0
Order By: Relevance
“…The hash values of retrieved candidates are returned to the client for refinement. The framework is extended in [29] where partial encryption is performed on the hash code of each item to prevent an untrustworthy server from precisely linking queries and database records. In particular, the server uses the unencrypted part of each item for approximate indexing and search while the client uses the encrypted part for reranking the candidates received from the server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The hash values of retrieved candidates are returned to the client for refinement. The framework is extended in [29] where partial encryption is performed on the hash code of each item to prevent an untrustworthy server from precisely linking queries and database records. In particular, the server uses the unencrypted part of each item for approximate indexing and search while the client uses the encrypted part for reranking the candidates received from the server.…”
Section: Related Workmentioning
confidence: 99%
“…In our design of the three-party search protocol, we consider a model where the different parties do not necessarily trust each other. We also assume that 1) the three parities do not collude with each other, 2) the communication channel between the parties is secure (e.g., encrypted), and 3) each party may behave in a curious-but-honest way, i.e., it follows the search protocol but may use any data in possession to glean additional information [5], [6], [28], [29]. As shown in Fig.…”
Section: Security Analysis Of the Search Protocolmentioning
confidence: 99%
“…Many schemes have been proposed in the field of secure CBIR [12][13][14][15][16][17][18][19][20][21][22], which can be roughly classified into two categories. In the first category, image owners extract features from plain images, and then outsource both the encrypted images and the encrypted image features to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…However, the above methods are concerned more with data confidentiality than retrieval efficiency, and the cost is expensive in practical applications. In the contrary, some efficient techniques, such as order-preserving encryption (OPE) [3,4], randomized hash functions [5][6][7], and asymmetric scalar-productpreserving encryption (ASPE) [8], are widely adopted. The reason is that they take both the data confidentiality and retrieval efficiency into account.…”
Section: Introductionmentioning
confidence: 99%
“…However, the access pattern is leaked in the above schemes. To solve this issue, Weng et al [7] omit certain bits of the hash code of query image. As a result, the cloud returns all possible candidates to the user.…”
Section: Introductionmentioning
confidence: 99%