[1] |
WANG W , DONG J , TAN T , et al A survey of passive image tampering detection[C]// International Workshop on Digital Watermarking (Iwdw 2009). c2009: 308-322.
|
[2] |
VERDOLIVA L . Handbook of digital forensics of multimedia data and devices[J]. IEEE Signal Processing Magazine, 2016, 33(1): 164-165.
|
[3] |
杨帅锋, 肖俊芳, 江浩 , 等. 世界网络安全发展特征与趋势[M]// 世界网络安全发展报告(2014~2015). 北京: 社会科学文献出版社, 2015: 21-42.
|
|
YANG S F , XIAO J F , JIANG H , et al. Characteristics and trends of the development of the network security in the world[M]// World Development Report On Network Security. Beijing: Social Sci-ences Academic Press, 2015: 21-42.
|
[4] |
QIN Z , YAN J , REN K , et al. Towards efficient privacy-preserving image feature extraction in cloud computing[C]// The 22nd ACM International Conference on Multimedia. c2014: 497-506.
|
[5] |
HU S , WANG Q , WANG J , et al. Securing SIFT:privacy- preserv-ing outsourcing computation of feature extractions over encrypted image data[J]. IEEE Transactions Image Process, 2016.
|
[6] |
QIN Z , YAN J , REN K , et al. Private image computation:the case of cloud based privacy-preserving SIFT[C]// IEEE Conference on Computer Communications Workshops (Infocom WKSHPS). c2014. 179-180.
|
[7] |
ZHENG P , HUANG J . Discrete wavelet transform and data expan-sion reduction in homomorphic encrypted domain[J]. IEEE Trans-actions on Image Processing, 2013, 22(6): 2455-2468.
|
[8] |
SAGHAIAN-NEJAD-ESFAHANI S M , LUO Y , SEN-CHING S C . Privacy protected image denoising with secret shares[C]// The 19th IEEE International Conference on Image Processing. c2012: 253-256.
|
[9] |
HU X , ZHANG W , HU H , et al. Non-local denoising in encrypted images[C]// The International Conference on Internet of Vehicles. c2014. 386-395.
|
[10] |
QIN Z , YAN J , REN K , et al. Privacy-preserving outsourcing of image global feature detection[C]// 2014 IEEE Global Communica-tions Conference. c2014: 710-715.
|
[11] |
SADEGHI A R , SCHNEIDER T , WEHRENBERG I . Efficient privacy-preserving face recognition[C]// The International Confer-ence on Information Security and Cryptology. c2009: 229-244.
|
[12] |
XIA Z , ZHU Y , SUN X , et al. Towards privacy-preserving con-tent-based image retrieval in cloud computing[J]. IEEE:Transac-tions on Cloud Computing, 2015.
|
[13] |
WANG Q , HU S , REN K , et al. Cloudbi:practical pri-vacy-preserving outsourcing of biometric identification in the cloud[C]// European Symposium on Research in Computer Security. c2015: 186-205.
|
[14] |
BARNI M , BIANCHI T , CATALANO D , et al. Privacy-preserving fingercode authentication[C]// The 12th ACM Workshop on Multi-media and Security. c2010: 231-240.
|
[15] |
OSADCHY M , PINKAS B , JARROUS A , et al. Scifi-a system for secure face identification[C]// 2010 IEEE Symposium on Security and Privacy. c2010: 239-254.
|
[16] |
PETER A , HARTMANN T , Müller S , et al. Privacy-preserving architecture for forensic image recognition[C]// IEEE International Workshop on Information Forensics and Security (WIFS). c2012: 79-84.
|
[17] |
RAHULAMATHAVAN Y , PHAN R C W , VELURU S , et al. Pri-vacy-preserving multi-class support vector machine for outsourcing the data classification in cloud[J]. IEEE Transactions on Depend-able and Secure Computing, 2014, 11(5): 467-479.
|
[18] |
VAIDYA J , SHAFIQ B , FAN W , et al. A random decision tree framework for privacy-preserving data mining[J]. IEEE Transac-tions on Dependable and Secure Computing, 2014, 11(5): 399-411.
|
[19] |
YUAN J , YU S . Privacy preserving back-propagation neural network learning made practical with cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 212-221.
|
[20] |
FONTANI M , BIANCHI T , ROSA D A , et al. A framework for decision fusion in image forensics based on dempster–shafer theory of evidence[J]. IEEE Transactions on Information Forensics&Se-curity, 2013, 8(4): 593-607.
|
[21] |
COZZOLINO D , GRAGNANIELLO D , VERDOLIVA L . A novel framework for image forgery localization[J]. Computer Science, 2013.
|
[22] |
GABORINI L , BESTAGINI P , MILANI S , et al. Multi-clue image tampering localization[C]// IEEE International Workshop on Infor-mation Forensics&Security,IEEE. 2014: 125-130.
|
[23] |
LOWE D G . Distinctive image features from scale-invariant key-points[J]. International Journal of Computer Vision, 2004, 60(60): 91-110.
|
[24] |
PAN X , LYU S . Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Se-curity, 2010, 5(4): 857-867.
|
[25] |
CHRISTLEIN V , RIESS C , JORDAN J , et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transac-tions on Information Forensics&Security, 2012, 7(6): 1841-1854.
|
[26] |
HSU C Y , LU C S , PEI S C . A robust and efficient anony-mous authentication protocol in VANET[J]. IEEE Transactions on Image Processing, 2012, 21(11): 4593-4607.
|
[27] |
PAILLIER P , POINTCHEVAL D . Efficient public-key cryptosys-tems provably secure against active adversaries[C]// International Conference on the Theory and Application of Cryptology and In-formation Security. c1999: 165-179.
|
[28] |
BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-LWE and security for key dependent mes-sages[C]// Annual Cryptology Conference. c2011: 505-524.
|
[29] |
LU W , VARNA A L , SWAMINATHAN A , et al. Secure image retrieval through feature protection[C]// IEEE International Confer-ence on Acoustics. c2009: 1533-1536.
|
[30] |
RANE , SHANTANU . Privacy-preserving nearest neighbor meth-ods[J]. IEEE Signal Processing Magazine, 2013, 30(2): 18-28.
|
[31] |
JOHNSON W B , LINDENSTRAUSS J . Extensions of Lipschitz mappings into a Hilbert space[J]. Contemporary Mathematics, 1984, 26(1): 189-206.
|
[32] |
ANDONI A , INDYK P , ZHU H , et al. Near-optimal hashing algorithms for ap-proximate nearest neighbor in high dimensions.[J]. Foundations of Computer Science Annual Symposium on, 2006, 51(1): 117-122.
|
[33] |
BOUFOUNOS P , RANE S . Secure binary embeddings for privacy preserving nearest neighbors[C]// IEEE International Workshop on Information Forensics and Security (WIFS). c2011: 1-6.
|
[34] |
LI J , LI X , YANG B , et al. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics&Security, 2015, 10(3): 507-518.
|
[35] |
PUN C M , YUAN X C , BI X L . Image forgery detection using adaptive over-segmentation and feature points matching[J]. IEEE Transactions on Information Forensics&Security, 2015, 10: 1.
|
[36] |
YU B , LI Z , BO C , et al. Surf feature extraction in encrypted do-main[C]// IEEE International Conference on Multimedia and Expo. c2014: 1-6.
|
[37] |
LUKAS J , FRIDRICH J , GOLJAN M . Digital camera identifica-tion from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 205-214.
|
[38] |
STAMM M C , WU M , LIU K J R . Information forensics:an over-view of the first decade[J]. Access IEEE, 2013, 1: 167-200.
|
[39] |
ATALLAH M J , KERSCHBAUM F , DU W . Secure and private sequence comparisons[C]// The ACM Workshop on Privacy in the Electronic Society(WPES'03). c2003: 39-44.
|
[40] |
HE Z , LU W , SUN W , et al. Digital image splicing detection based on Markov features in DCT and DWT domain[J]. Pattern Recogni-tion, 2012, 45(12): 4292-4299.
|
[41] |
NG T T , CHANG S F , SUN Q . Blind detection of photomontage using higher order statistics[C]// IEEE International Symposium on Circuits and Systems. c2004.
|
[42] |
QIU X , LI H , LUO W , et al. A universal image forensic strategy based on steganalytic model[C]// The 2nd ACM Workshop on In-formation Hiding and Multimedia Security. c2014: 165-170.
|
[43] |
BIANCHI T , PIVA A , BARNI M . On the implementation of the discrete Fourier transform in the encrypted domain[J]. IEEE Trans-actions on Information Forensics&Security, 2009, 4(1): 86-97.
|
[44] |
BIANCHI T , PIVA A , BARNI M . Encrypted domain DCT based on homomorphic cryptosystems[J]. Eurasip Journal on Information Security, 2009, 2009(2): 1-12.
|
[45] |
YU H , JIANG X , VAIDYA J . Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data[C]// ACM Sym-posium on Applied Computing, c2006: 603-610.
|
[46] |
MANGASARIAN O L , WILD E W . Privacy-preserving classifica-tion of horizontally partitioned data via random kernels[C]// Inter-national Conference on Data Mining, Las Vegas. c2008.
|
[47] |
VAIDYA J , YU H , JIANG X . Privacy-preserving SVM classifica-tion[J]. Knowledge&Information Systems, 2008, 14(2): 161-178.
|
[48] |
LIU X , CHOO R , DENG R , et al. Efficient and privacy-preserving outsourced calculation of rational numbers[J]. IEEE Transactions on Dependable&Secure Computing, 2016: 1-1.
|
[49] |
LIU X , DENG R , DING W , et al. Privacy-preserving outsourced calculation on floating point numbers[J]. IEEE Transactions on In-formation Forensics&Security, 2016: 1-1.
|