2020
DOI: 10.1109/tdsc.2017.2751476
|View full text |Cite
|
Sign up to set email alerts
|

Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Chang et al adopted pseudorandom functions to solve the problem of privacy preserving keyword searches on remote encrypted data and solved the update problem [17]. Thereafter, some researchers in the field of security proposed a lot of outspread searchable encryption solutions [18][19][20][21][22]. Wang et al investigate the problem of secure and efficient similarity search over outsourced cloud data and proposed a new symbol-based trietraverse searching mechanism [18].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Chang et al adopted pseudorandom functions to solve the problem of privacy preserving keyword searches on remote encrypted data and solved the update problem [17]. Thereafter, some researchers in the field of security proposed a lot of outspread searchable encryption solutions [18][19][20][21][22]. Wang et al investigate the problem of secure and efficient similarity search over outsourced cloud data and proposed a new symbol-based trietraverse searching mechanism [18].…”
Section: Related Workmentioning
confidence: 99%
“…The questions of the secure and efficient ranked search over encrypted outsourcing data were studied in the literatures [19,20]. Du et al presented a dynamic multiclient searchable symmetric encryption scheme supporting Boolean queries which allowed the data owner to authorize multiple users to excute Boolean queries over the encrypted data [21]. Li Wireless Communications and Mobile Computing techniques to present a dynamic searchable symmetric encryption scheme and addressed the key sharing problem [22], but all the searchable encryption solutions cannot be used to perform optimal route finding with support for semantic search over encrypted graph data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, many secure SIFT feature extraction schemes are studied. To save storage space and enhance efficiency, Jiang et al proposed an efficient privacypreserving SIFT feature extraction method [17]. In this method, the authors designed an encoding method which converts a non-integer into an integer.…”
Section: Related Workmentioning
confidence: 99%
“…There is an increasing need for secure image data sharing in cloud computing. Numerous previous works focused on secure image feature extraction from encrypted images such as speeded up robust feature (SURF) [14], scale-invariant feature transform (SIFT) [15][16][17][18], the histogram of oriented gradient (HOG) [19] and local binary pattern (LBP) [20][21][22]. To save storage space and communication bandwidth, digital images are often compressed before uploading on the cloud server.…”
Section: Introductionmentioning
confidence: 99%