Privacy-preserving query over the encrypted image in cloud computing

被引:6
|
作者
Zhu, Xudong [1 ]
Li, Hui [2 ]
Guo, Zhen [2 ]
机构
[1] School of Information and Control Engineering, Xi'an Univ. of Architecture and Technology, Xi'an 710055, China
[2] School of Telecommunication Engineering, Xidian Univ., Xi'an 710071, China
关键词
17;
D O I
10.3969/j.issn.1001-2400.2014.02.025
中图分类号
学科分类号
摘要
引用
收藏
页码:151 / 158
相关论文
共 50 条
  • [31] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418
  • [32] Privacy-Preserving SVM Computing in the Encrypted Domain
    Maekawa, Takahiro
    Kawamura, Ayana
    Kinoshita, Yuma
    Kiya, Hitoshi
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 897 - 902
  • [33] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [34] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [35] Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data
    Li, Xiaoguo
    Xiang, Tao
    Guo, Shangwei
    Li, Hongwei
    Mu, Yi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2954 - 2968
  • [36] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [37] Privacy-preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing
    Kim, Hyeong-Jin
    Shin, Jae-Hwan
    Song, Young-ho
    Chang, Jae-Woo
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, : 487 - 489
  • [38] An Efficient Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Data in Cloud Computing
    Ahmad, Shadab
    Kurnar, Pasupuleti Syam
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [39] Privacy-Preserving Multi-Keyword Search over the Encrypted Data for Multiple Users in Cloud Computing
    Ranjan, Khirendra Alok
    Pasupulati, Syam Kumar
    Ramaligam, Subramanian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1079 - 1084
  • [40] A privacy-preserving cross-media retrieval on encrypted data in cloud computing
    Wang, Zhangdong
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    Peng, Jia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73