Fanti et al., 2012 - Google Patents
Private media search on public databasesFanti et al., 2012
View PDF- Document ID
- 414127984069239165
- Author
- Fanti G
- Finiasz M
- Ramchandran K
- Publication year
- Publication venue
- submitted for publication
External Links
Snippet
Content-based media searches are growing to be a key component of many emerging applications, and they have the potential to change the way people interact with their environments (see eg [1],[2]). Examples of these technologies include voice and face …
- 238000000034 method 0 abstract description 62
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization | |
Weng et al. | A privacy-preserving framework for large-scale content-based information retrieval | |
Chi et al. | Hashing techniques: A survey and taxonomy | |
US20230289469A1 (en) | Privacy-preserving fuzzy query system and method | |
Bringer et al. | Identification with encrypted biometric data | |
US10635824B1 (en) | Methods and apparatus for private set membership using aggregation for reduced communications | |
Liu et al. | Intelligent and secure content-based image retrieval for mobile users | |
Cheng et al. | Person re-identification over encrypted outsourced surveillance videos | |
Lim et al. | An efficient dynamic reliability-dependent bit allocation for biometric discretization | |
Bringer et al. | Embedding edit distance to enable private keyword search | |
Wang et al. | Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification | |
Zhao et al. | Iris template protection based on local ranking | |
Fanti et al. | One-way private media search on public databases: The role of signal processing | |
CN112332979B (en) | Ciphertext search method, system and equipment in cloud computing environment | |
Zeroual et al. | Lightweight deep learning model to secure authentication in Mobile Cloud Computing | |
Abduljabbar et al. | EEIRI: efficient encrypted image retrieval in IoT-cloud | |
de Groot et al. | Quantization in zero leakage helper data schemes | |
Ye et al. | Anonymous biometric access control | |
Li et al. | DVPPIR: privacy-preserving image retrieval based on DCNN and VHE | |
Yang et al. | MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud | |
Jin et al. | Efficient blind face recognition in the cloud | |
Lakshmi et al. | Image encryption algorithms using machine learning and deep learning techniques—A Survey | |
Fanti et al. | Private media search on public databases | |
CN116821429A (en) | Safe text classification method and system based on privacy set operation | |
Liu et al. | Cryptanalysis of a fast private information retrieval protocol |