Privacy-preserving outsourcing of image feature extraction in cloud computing
From MaRDI portal
Recommendations
- Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption
- PPOIM: privacy-preserving shape context based image denoising and matching with efficient outsourcing
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data
- A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
- Cloud-assisted secure biometric identification with sub-linear search efficiency
Cites work
- scientific article; zbMATH DE number 512874 (Why is no real title available?)
- scientific article; zbMATH DE number 1024049 (Why is no real title available?)
- A correction to `efficient and secure comparison for on-line auctions'
- A proof of security of Yao's protocol for two-party computation
- A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
- Efficient and Secure Comparison for On-Line Auctions
- Foundations of Cryptography
- How to share a function securely
- How to share a secret
- Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- Learning Binary Hash Codes for Large-Scale Image Search
- Practical and Secure Solutions for Integer Comparison
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Theory of Cryptography
- Tight bounds on the information rate of secret sharing schemes
Cited in
(8)- A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
- Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption
- PPOIM: privacy-preserving shape context based image denoising and matching with efficient outsourcing
- Sorted index numbers for privacy preserving face recognition
- Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
- Cloud-assisted secure biometric identification with sub-linear search efficiency
- Experimenting grid protocols to improve privacy preservation in efficient distributed image processing
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data
This page was built for publication: Privacy-preserving outsourcing of image feature extraction in cloud computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1701922)