Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (8): 23-31.doi: 10.11959/j.issn.2096-109x.2016.00085
• Academic paper • Previous Articles Next Articles
Bing-wen FENG1(),Jian WENG1,Wei LU2
Revised:
2016-07-30
Online:
2016-08-01
Published:
2017-06-04
CLC Number:
Bing-wen FENG,Jian WENG,Wei LU. Research on outsourcing of digital image forensics based on privacy preserving[J]. Chinese Journal of Network and Information Security, 2016, 2(8): 23-31.
[1] | WANG W , DONG J , TAN T , et al A survey of passive image tampering detection[C]// International Workshop on Digital Watermarking (Iwdw 2009). c2009: 308-322. |
[2] | VERDOLIVA L . Handbook of digital forensics of multimedia data and devices[J]. IEEE Signal Processing Magazine, 2016, 33(1): 164-165. |
[3] | 杨帅锋, 肖俊芳, 江浩 , 等. 世界网络安全发展特征与趋势[M]// 世界网络安全发展报告(2014~2015). 北京: 社会科学文献出版社, 2015: 21-42. |
YANG S F , XIAO J F , JIANG H , et al. Characteristics and trends of the development of the network security in the world[M]// World Development Report On Network Security. Beijing: Social Sci-ences Academic Press, 2015: 21-42. | |
[4] | QIN Z , YAN J , REN K , et al. Towards efficient privacy-preserving image feature extraction in cloud computing[C]// The 22nd ACM International Conference on Multimedia. c2014: 497-506. |
[5] | HU S , WANG Q , WANG J , et al. Securing SIFT:privacy- preserv-ing outsourcing computation of feature extractions over encrypted image data[J]. IEEE Transactions Image Process, 2016. |
[6] | QIN Z , YAN J , REN K , et al. Private image computation:the case of cloud based privacy-preserving SIFT[C]// IEEE Conference on Computer Communications Workshops (Infocom WKSHPS). c2014. 179-180. |
[7] | ZHENG P , HUANG J . Discrete wavelet transform and data expan-sion reduction in homomorphic encrypted domain[J]. IEEE Trans-actions on Image Processing, 2013, 22(6): 2455-2468. |
[8] | SAGHAIAN-NEJAD-ESFAHANI S M , LUO Y , SEN-CHING S C . Privacy protected image denoising with secret shares[C]// The 19th IEEE International Conference on Image Processing. c2012: 253-256. |
[9] | HU X , ZHANG W , HU H , et al. Non-local denoising in encrypted images[C]// The International Conference on Internet of Vehicles. c2014. 386-395. |
[10] | QIN Z , YAN J , REN K , et al. Privacy-preserving outsourcing of image global feature detection[C]// 2014 IEEE Global Communica-tions Conference. c2014: 710-715. |
[11] | SADEGHI A R , SCHNEIDER T , WEHRENBERG I . Efficient privacy-preserving face recognition[C]// The International Confer-ence on Information Security and Cryptology. c2009: 229-244. |
[12] | XIA Z , ZHU Y , SUN X , et al. Towards privacy-preserving con-tent-based image retrieval in cloud computing[J]. IEEE:Transac-tions on Cloud Computing, 2015. |
[13] | WANG Q , HU S , REN K , et al. Cloudbi:practical pri-vacy-preserving outsourcing of biometric identification in the cloud[C]// European Symposium on Research in Computer Security. c2015: 186-205. |
[14] | BARNI M , BIANCHI T , CATALANO D , et al. Privacy-preserving fingercode authentication[C]// The 12th ACM Workshop on Multi-media and Security. c2010: 231-240. |
[15] | OSADCHY M , PINKAS B , JARROUS A , et al. Scifi-a system for secure face identification[C]// 2010 IEEE Symposium on Security and Privacy. c2010: 239-254. |
[16] | PETER A , HARTMANN T , Müller S , et al. Privacy-preserving architecture for forensic image recognition[C]// IEEE International Workshop on Information Forensics and Security (WIFS). c2012: 79-84. |
[17] | RAHULAMATHAVAN Y , PHAN R C W , VELURU S , et al. Pri-vacy-preserving multi-class support vector machine for outsourcing the data classification in cloud[J]. IEEE Transactions on Depend-able and Secure Computing, 2014, 11(5): 467-479. |
[18] | VAIDYA J , SHAFIQ B , FAN W , et al. A random decision tree framework for privacy-preserving data mining[J]. IEEE Transac-tions on Dependable and Secure Computing, 2014, 11(5): 399-411. |
[19] | YUAN J , YU S . Privacy preserving back-propagation neural network learning made practical with cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 212-221. |
[20] | FONTANI M , BIANCHI T , ROSA D A , et al. A framework for decision fusion in image forensics based on dempster–shafer theory of evidence[J]. IEEE Transactions on Information Forensics&Se-curity, 2013, 8(4): 593-607. |
[21] | COZZOLINO D , GRAGNANIELLO D , VERDOLIVA L . A novel framework for image forgery localization[J]. Computer Science, 2013. |
[22] | GABORINI L , BESTAGINI P , MILANI S , et al. Multi-clue image tampering localization[C]// IEEE International Workshop on Infor-mation Forensics&Security,IEEE. 2014: 125-130. |
[23] | LOWE D G . Distinctive image features from scale-invariant key-points[J]. International Journal of Computer Vision, 2004, 60(60): 91-110. |
[24] | PAN X , LYU S . Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics and Se-curity, 2010, 5(4): 857-867. |
[25] | CHRISTLEIN V , RIESS C , JORDAN J , et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transac-tions on Information Forensics&Security, 2012, 7(6): 1841-1854. |
[26] | HSU C Y , LU C S , PEI S C . A robust and efficient anony-mous authentication protocol in VANET[J]. IEEE Transactions on Image Processing, 2012, 21(11): 4593-4607. |
[27] | PAILLIER P , POINTCHEVAL D . Efficient public-key cryptosys-tems provably secure against active adversaries[C]// International Conference on the Theory and Application of Cryptology and In-formation Security. c1999: 165-179. |
[28] | BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-LWE and security for key dependent mes-sages[C]// Annual Cryptology Conference. c2011: 505-524. |
[29] | LU W , VARNA A L , SWAMINATHAN A , et al. Secure image retrieval through feature protection[C]// IEEE International Confer-ence on Acoustics. c2009: 1533-1536. |
[30] | RANE , SHANTANU . Privacy-preserving nearest neighbor meth-ods[J]. IEEE Signal Processing Magazine, 2013, 30(2): 18-28. |
[31] | JOHNSON W B , LINDENSTRAUSS J . Extensions of Lipschitz mappings into a Hilbert space[J]. Contemporary Mathematics, 1984, 26(1): 189-206. |
[32] | ANDONI A , INDYK P , ZHU H , et al. Near-optimal hashing algorithms for ap-proximate nearest neighbor in high dimensions.[J]. Foundations of Computer Science Annual Symposium on, 2006, 51(1): 117-122. |
[33] | BOUFOUNOS P , RANE S . Secure binary embeddings for privacy preserving nearest neighbors[C]// IEEE International Workshop on Information Forensics and Security (WIFS). c2011: 1-6. |
[34] | LI J , LI X , YANG B , et al. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics&Security, 2015, 10(3): 507-518. |
[35] | PUN C M , YUAN X C , BI X L . Image forgery detection using adaptive over-segmentation and feature points matching[J]. IEEE Transactions on Information Forensics&Security, 2015, 10: 1. |
[36] | YU B , LI Z , BO C , et al. Surf feature extraction in encrypted do-main[C]// IEEE International Conference on Multimedia and Expo. c2014: 1-6. |
[37] | LUKAS J , FRIDRICH J , GOLJAN M . Digital camera identifica-tion from sensor pattern noise[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 205-214. |
[38] | STAMM M C , WU M , LIU K J R . Information forensics:an over-view of the first decade[J]. Access IEEE, 2013, 1: 167-200. |
[39] | ATALLAH M J , KERSCHBAUM F , DU W . Secure and private sequence comparisons[C]// The ACM Workshop on Privacy in the Electronic Society(WPES'03). c2003: 39-44. |
[40] | HE Z , LU W , SUN W , et al. Digital image splicing detection based on Markov features in DCT and DWT domain[J]. Pattern Recogni-tion, 2012, 45(12): 4292-4299. |
[41] | NG T T , CHANG S F , SUN Q . Blind detection of photomontage using higher order statistics[C]// IEEE International Symposium on Circuits and Systems. c2004. |
[42] | QIU X , LI H , LUO W , et al. A universal image forensic strategy based on steganalytic model[C]// The 2nd ACM Workshop on In-formation Hiding and Multimedia Security. c2014: 165-170. |
[43] | BIANCHI T , PIVA A , BARNI M . On the implementation of the discrete Fourier transform in the encrypted domain[J]. IEEE Trans-actions on Information Forensics&Security, 2009, 4(1): 86-97. |
[44] | BIANCHI T , PIVA A , BARNI M . Encrypted domain DCT based on homomorphic cryptosystems[J]. Eurasip Journal on Information Security, 2009, 2009(2): 1-12. |
[45] | YU H , JIANG X , VAIDYA J . Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data[C]// ACM Sym-posium on Applied Computing, c2006: 603-610. |
[46] | MANGASARIAN O L , WILD E W . Privacy-preserving classifica-tion of horizontally partitioned data via random kernels[C]// Inter-national Conference on Data Mining, Las Vegas. c2008. |
[47] | VAIDYA J , YU H , JIANG X . Privacy-preserving SVM classifica-tion[J]. Knowledge&Information Systems, 2008, 14(2): 161-178. |
[48] | LIU X , CHOO R , DENG R , et al. Efficient and privacy-preserving outsourced calculation of rational numbers[J]. IEEE Transactions on Dependable&Secure Computing, 2016: 1-1. |
[49] | LIU X , DENG R , DING W , et al. Privacy-preserving outsourced calculation on floating point numbers[J]. IEEE Transactions on In-formation Forensics&Security, 2016: 1-1. |
[1] | Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU. Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 60-72. |
[2] | Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU. Strategy of container migration and honeypot deployment based on signal game in cloud environment [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 87-96. |
[3] | Shang LIU, Yinzhang GUO. Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 176-188. |
[4] | Yi ZHANG, Liqin TIAN, Zenan WU, Wenxing WU. Trust evaluation optimization mechanism for cloud user behavior based on FANP [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 175-182. |
[5] | Xianmang HE. Multi-party summation query method based on differential privacy [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 14-18. |
[6] | Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28. |
[7] | Ying LI, Chunguang MA. Overview of searchable encryption research [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21. |
[8] | Mengyang YU,Hui LIN,Youliang TIAN. New cross-layer reputation mechanism for mobile cloud computing [J]. Chinese Journal of Network and Information Security, 2018, 4(3): 51-58. |
[9] | Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG. Survey on public key encryption with equality test [J]. Chinese Journal of Network and Information Security, 2018, 4(11): 13-22. |
[10] | Jianbiao ZHANG,Yuanxi ZHU,Jun HU,Xiao WANG. Scheme of virtual machine trusted migration in cloud environment [J]. Chinese Journal of Network and Information Security, 2018, 4(1): 6-14. |
[11] | Weifeng LI,Weizhong QIANG,Weiming LI,Deqing ZOU. Research on forensics of privacy violations in cloud environment [J]. Chinese Journal of Network and Information Security, 2018, 4(1): 26-35. |
[12] | Yuan-zhao GAO,Xue-juan LI,Bing-long LI,Xi-xi WU. Cloud computing forensic model [J]. Chinese Journal of Network and Information Security, 2017, 3(9): 13-23. |
[13] | Xing-lan ZHANG,Xiang LIU. Secure efficient and verifiable large linear equations solve outsourcing computing scheme [J]. Chinese Journal of Network and Information Security, 2017, 3(6): 1-7. |
[14] | De-yu YUAN,Xiao-juan WANG,Jian-chao WAN. Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9. |
[15] | Jiang-yong SHI,Yue-xiang YANG,Wen-hua LI,Sen WANG. Research on SDN-based cloud security application [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 10-25. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|