[1] |
FISCHER B , BROSIG A , DESERNO T M ,et al. Structural scene analysis and content-based image retrieval applied to bone age assessment[C]// Proc Society of Photo-Optical Instrumentation Engineers Conference Series. 2009,7260:726004-726011.
|
[2] |
MISHRA N , SILAKARI S . Image Mining in the Context of Content Based Image Retrieval:A Perspective[J]. International Journal of Computer Science Issues, 2012,9(4): 121-132.
|
[3] |
BO C , SHEN G , LIU J ,et al. Privacy.tag:privacy concern expressed and respected[C]// Proc.ACM International Conference on Embedded Networked Sensor Systems (SenSys’14). 2014: 163-176.
|
[4] |
SHASHANK J , KOWSHIK P , SRINATHAN K ,et al. Private Content Based Image Retrieval[C]// IEEE Conference on Computer Vision and Pattern Recognition (CVPR’14). 2014: 1-8.
|
[5] |
LU W , SWAMINATHAN A , Varna A L ,et al. Enabling search over encrypted multimedia databases[C]// Media Forensics and Security I. 2009:725418.
|
[6] |
PERRONNIN F , LIU Y , SANCHEZ J ,et al. Large-scale image retrieval with compressed Fisher vectors[C]// Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR’10). 2010: 3384-3391.
|
[7] |
DOUZE M , RAMISA A , SCHMID C . Combining attributes and Fisher vectors for efficient image retrieval[C]// Proc.IEEE Conference on Computer Vision and Pattern Recognition (CVPR'11). 2011: 745-752.
|
[8] |
HSU C Y , LU C S , PEI S C . Secure and robust SIFT[C]// Proc.ACM International Conference on Multimedia (MM’09). 2009: 637-640.
|
[9] |
ZHANG Y , SUN X , WANG B . Efficient algorithm for k-barrier coverage based on integer linear programming[J]. China Communications, 2016,13(7): 16-23.
|
[10] |
ZHENG P , HUANG J . An efficient image homomorphic encryption scheme with small ciphertext expansion[C]// ACM International Conference on Multimedia. 2013,24(3): 803-812.
|
[11] |
XIA Z , XIONG N N , VASILAKOS A V ,et al. EPCBIR:An efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J]. Information Sciences, 2017,387: 195-204.
|
[12] |
WONG W K , CHEUNG D W , KAO B ,et al. Secure kNN computation on encrypted databases[C]// International Conference on Management of Data. 2009: 139-152.
|
[13] |
YUAN J , YU S , GUO L . SEISA:Secure and efficient encrypted image search with access control[C]// IEEE Conference on Computer Communications. 2015: 2083-2091.
|
[14] |
ZHANG L , JUNG T , FENG P ,et al. PIC:enable large-scale privacy preserving content-based image search on cloud[C]// International Conference on Parallel Processing. 2015: 949-958.
|
[15] |
JEGOU H , DOUZE M , SCHMID C . Hamming embedding and weak geometric consistency for large scale image search[C]// Proc European Conference on Computer Vision. 2008: 304-317.
|
[16] |
YUAN J , TIAN Y . Practical privacy-preserving mapreduce basedk-means clustering over large-scale dataset[J]. IEEE Transactions on Cloud Computing, 2017,PP(99): 1-1.
|
[17] |
REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40.
|
[18] |
XIAO X , LI F , YAO B . Secure nearest neighbor revisited[C]// Proc.IEEE International Conference on Data Engineering. 2013: 733-744.
|
[19] |
YUE Y , FINLEY T , RADLINSKI F ,et al. A support vector method for optimizing average precision[C]// Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’07). 2007: 271-278.
|