Privacy Protection Using Encrypted Images
Abstract
Keywords
Full Text:
PDFReferences
W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, “Enabling search over encrypted multimedia databases,” Proc. SPIE, vol. 7254, pp. 1–11, Jan. 2009.
J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar, “Private content based image retrieval,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2008, pp. 1–8.
C. Y. Hsu, C. S. Lu, and S. C. Pei, “Homomorphic encryption-based secure sift for privacy-preserving feature extraction,” Proc. IS&T/SPIE Media Watermark., Forensics, Security, vol. 7880, pp. 788005-1– 788005-17, Jan. 2011.
Z. Yang, S. Kamata, and A. Ahrary, “NIR: Content based image retrieval on cloud computing,” in Proc. IEEE Int. Conf. Intell. Comput. Intell. Syst., vol. 3. Nov. 2009, pp. 556–559.
B. Moskovich and M. Osadchy, “Illumination invariant representation for privacy preserving face identification,” in Proc. IEEE Comput. Vis. Pattern Recognit. Workshop, Jun. 2010, pp. 154–161.
kede ma, weiming zhang, xianfeng zhao, member, ieee, nenghai yu, and fenghua li “reversible data hiding in encrypted images byReserving room before encryption” ieee transactions on information forensics and security, vol. 8, no. 3, march 2013
Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany{ahmad.sadeghi,thomas.schneider}@trust.rub.de??,immo.wehrenberg@rub.de
Tiziano Bianchi, Member, IEEE, Alessandro Piva, Member, IEEE, and Mauro Barni, Senior Member, IEEE
Chao-Yung Hsu,1,2 Chun-Shien Lu,2,∗ and Soo-Chang Pei 11Graduate Institute of Communication Eng., National Taiwan University, Taipei, Taiwan, ROC 2Institute of Information Science, Academia Sinica, Taipei, Taiwan, ROC
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.