Lu et al., 2009 - Google Patents
Enabling search over encrypted multimedia databasesLu et al., 2009
View PDF- Document ID
- 14598506363931652869
- Author
- Lu W
- Swaminathan A
- Varna A
- Wu M
- Publication year
- Publication venue
- Media Forensics and Security
External Links
Snippet
Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | Enabling search over encrypted multimedia databases | |
Qin et al. | Towards efficient privacy-preserving image feature extraction in cloud computing | |
Wang et al. | Searchable encryption over feature-rich data | |
Lu et al. | Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization | |
Kuzu et al. | Efficient similarity search over encrypted data | |
Zhang et al. | Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices | |
Weng et al. | A privacy-preserving framework for large-scale content-based information retrieval | |
Lu et al. | Secure image retrieval through feature protection | |
Yuan et al. | Enabling privacy-preserving image-centric social discovery | |
Weng et al. | Privacy-preserving outsourced media search | |
Chen et al. | EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data | |
Li et al. | Secure content-based image retrieval in the cloud with key confidentiality | |
Qin et al. | SecSIFT: Secure image SIFT feature extraction in cloud computing | |
Qin et al. | Privacy-preserving outsourcing of image global feature detection | |
Abduljabbar et al. | EEIRI: efficient encrypted image retrieval in IoT-cloud | |
Yuan et al. | Towards privacy-preserving and practical image-centric social discovery | |
Boucenna et al. | Secure inverted index based search over encrypted cloud data with user access rights management | |
Yan et al. | Secure multi-keyword search supporting dynamic update and ranked retrieval | |
Anju et al. | A Secure Image Outsourcing using Privacy-Preserved Local Color Layout Descriptor in Cloud Environment | |
Majhi et al. | Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature | |
Kozak et al. | Efficiency and security in similarity cloud services | |
Kim et al. | A privacy-preserving top-k query processing algorithm in the cloud computing | |
Xue et al. | Cuckoo-filter based privacy-aware search over encrypted cloud data | |
Guo et al. | Privacy preserving weighted similarity search scheme for encrypted data | |
Aritomo et al. | A privacy-preserving similarity search scheme over encrypted word embeddings |