Privacy-preserving outsourcing of image feature extraction in cloud computing
From MaRDI portal
Publication:1701922
DOI10.1007/s00500-016-2066-5zbMath1381.94101OpenAlexW2261315131MaRDI QIDQ1701922
Jin Li, Zheng-An Yao, Tong Li, Ping Li, Chun-Ming Tang
Publication date: 27 February 2018
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-016-2066-5
Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- A correction to `efficient and secure comparison for on-line auctions'
- A proof of security of Yao's protocol for two-party computation
- Tight bounds on the information rate of secret sharing schemes
- How to share a function securely
- How to share a secret
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
- Efficient and Secure Comparison for On-Line Auctions
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Learning Binary Hash Codes for Large-Scale Image Search
- Foundations of Cryptography
- Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT
- Theory of Cryptography
- Practical and Secure Solutions for Integer Comparison
- Advances in Cryptology - ASIACRYPT 2003