[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lu et al., 2009 - Google Patents

Enabling search over encrypted multimedia databases

Lu et al., 2009

View PDF
Document ID
14598506363931652869
Author
Lu W
Swaminathan A
Varna A
Wu M
Publication year
Publication venue
Media Forensics and Security

External Links

Snippet

Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over …
Continue reading at cop4708.pbworks.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Lu et al. Enabling search over encrypted multimedia databases
Qin et al. Towards efficient privacy-preserving image feature extraction in cloud computing
Wang et al. Searchable encryption over feature-rich data
Lu et al. Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization
Kuzu et al. Efficient similarity search over encrypted data
Zhang et al. Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices
Weng et al. A privacy-preserving framework for large-scale content-based information retrieval
Lu et al. Secure image retrieval through feature protection
Yuan et al. Enabling privacy-preserving image-centric social discovery
Weng et al. Privacy-preserving outsourced media search
Chen et al. EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data
Li et al. Secure content-based image retrieval in the cloud with key confidentiality
Qin et al. SecSIFT: Secure image SIFT feature extraction in cloud computing
Qin et al. Privacy-preserving outsourcing of image global feature detection
Abduljabbar et al. EEIRI: efficient encrypted image retrieval in IoT-cloud
Yuan et al. Towards privacy-preserving and practical image-centric social discovery
Boucenna et al. Secure inverted index based search over encrypted cloud data with user access rights management
Yan et al. Secure multi-keyword search supporting dynamic update and ranked retrieval
Anju et al. A Secure Image Outsourcing using Privacy-Preserved Local Color Layout Descriptor in Cloud Environment
Majhi et al. Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature
Kozak et al. Efficiency and security in similarity cloud services
Kim et al. A privacy-preserving top-k query processing algorithm in the cloud computing
Xue et al. Cuckoo-filter based privacy-aware search over encrypted cloud data
Guo et al. Privacy preserving weighted similarity search scheme for encrypted data
Aritomo et al. A privacy-preserving similarity search scheme over encrypted word embeddings