[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Fanti et al., 2012 - Google Patents

Private media search on public databases

Fanti et al., 2012

View PDF
Document ID
414127984069239165
Author
Fanti G
Finiasz M
Ramchandran K
Publication year
Publication venue
submitted for publication

External Links

Snippet

Content-based media searches are growing to be a key component of many emerging applications, and they have the potential to change the way people interact with their environments (see eg [1],[2]). Examples of these technologies include voice and face …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Lu et al. Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization
Weng et al. A privacy-preserving framework for large-scale content-based information retrieval
Chi et al. Hashing techniques: A survey and taxonomy
US20230289469A1 (en) Privacy-preserving fuzzy query system and method
Bringer et al. Identification with encrypted biometric data
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
Liu et al. Intelligent and secure content-based image retrieval for mobile users
Cheng et al. Person re-identification over encrypted outsourced surveillance videos
Lim et al. An efficient dynamic reliability-dependent bit allocation for biometric discretization
Bringer et al. Embedding edit distance to enable private keyword search
Wang et al. Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification
Zhao et al. Iris template protection based on local ranking
Fanti et al. One-way private media search on public databases: The role of signal processing
CN112332979B (en) Ciphertext search method, system and equipment in cloud computing environment
Zeroual et al. Lightweight deep learning model to secure authentication in Mobile Cloud Computing
Abduljabbar et al. EEIRI: efficient encrypted image retrieval in IoT-cloud
de Groot et al. Quantization in zero leakage helper data schemes
Ye et al. Anonymous biometric access control
Li et al. DVPPIR: privacy-preserving image retrieval based on DCNN and VHE
Yang et al. MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
Jin et al. Efficient blind face recognition in the cloud
Lakshmi et al. Image encryption algorithms using machine learning and deep learning techniques—A Survey
Fanti et al. Private media search on public databases
CN116821429A (en) Safe text classification method and system based on privacy set operation
Liu et al. Cryptanalysis of a fast private information retrieval protocol