[1] |
ARMBRUST M . A view of cloud computing[J]. Communications of the ACM, 2010,4(53): 50-58.
|
[2] |
MODI C , PATEL D , BORISANIYA B , et al. survey of intrusion detection techniques in cloud[J]. Journal of Network and Computer Applications, 2013,36(1): 42-57.
|
[3] |
LU W . Secure image retrieval through feature protection[C]// IEEE International Conference on Acoustics.c 20091533-1536.
|
[4] |
HSU C Y . Image feature extraction in encrypted domain with pri-vacy-preserving SIFT[J]. IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, 2012,21(11): 4593-4607.
|
[5] |
HSU C Y . Homomorphic encryption-based secure SIFT for pri-vacy-preserving feature extraction[C]// Society of Photo-optical In-strumentation Engineers Conference Series.c 2011.
|
[6] |
NAEHRIG M . Can homomorphic encryption be practical? [C]// The 3rd ACM Workshop on Cloud Computing Security Workshop.c 2011:113-124.
|
[7] |
QIN Z , YAN J , REN K , et al Privacy-preserving outsourcing of image global feature detection[C]// IEEE Global Communications Conference.c 2014:710-715.
|
[8] |
QIN Z , YAN J , REN K , et al. Towards efficient privacy-preserving image feature extraction in cloud computing[C]// ACM Interna-tional Conference on Multimedia.c 2014:497-506.
|
[9] |
WANG S , NASSAR M , ATALLAH M , et al. Secure and private outsourcing of shape-based feature extraction[C]// Information and Communications Security.c 2013:90-99.
|
[10] |
ERKIN Z , FRANZ M , GUAJARDO J , et al. Privacy-preserving face recognition[M]// Privacy Enhancing Technologies. Berlin:Springer Berlin Heidelberg, 2009.
|
[11] |
BIANCHI T . Privacy-preserving fingercode authentication[C]// 12th ACM Workshop on Multimedia and Security, Rome.c 2010:231-240.
|
[12] |
BARNI M , FAILLA P , LAZZERETTI R , et al. Privacy-preserving ECG classification with branching programs and neural networks[J]. IEEE Transactions on Information Forensics & Security, 2011,6(2): 452-468.
|
[13] |
LU W . Enabling search over encrypted multimedia databases[C]// ISQT-SPIE Electronic Imaging Symposium on Media Forensics and Security I, San Jose, CA,c 2009.
|
[14] |
KHAN M K , ZHANG J , ALGHATHBAR K . Challenge-response-based biometric image scrambling for secure personal identifica-tion[J]. Future Generation Computer Systems, 2010,27(4): 411-418.
|
[15] |
PANDEY S , VOORSLUYS W , NIU S , et al. An autonomic cloud environment for hosting ECG data analysis services[J]. Future Generation Computer Systems, 2012,28(1): 147-154.
|
[16] |
GENTRY C . Enabling search over encrypted multimedia databases[C]// ISQT-SPIE Electronic Imaging Symposium on Media Forensics and Security I, San Jose, CA,c 2009.
|
[17] |
Processing-eigenfaces. An example of using the p-eigenfaces proc-essing library to perform face recognition[EB/OL]. .
|
[18] |
YAO A C . Protocols for secure computation[C]// The 23rd Annual Symposium on Foundations of Computer Science.c 1982:160-164.
|
[19] |
DWORK C . Differential privacy[M]// /Automata, Larguages and Programming. Berlin: Springer Berlin Heidelbeng, 2006:1-2.
|
[20] |
DUCHI J C , JORDAN M , WAINWRIGHT M J , et al. Local privacy and statistical minimax rates[C]// The 54th Annual Symposium on Foundations of Computer Science Berkeley, 2013:429-438.
|