EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud |
Abduljabbar, Zaid Ameen
(College of Education for Pure Sciences, University of Basrah)
Ibrahim, Ayad (College of Education for Pure Sciences, University of Basrah) Hussain, Mohammed Abdulridha (College of Education for Pure Sciences, University of Basrah) Hussien, Zaid Alaa (Southern Technical University) Al Sibahee, Mustafa A. (Shenzhen Huazhong University of Science and Technology Research Institute) Lu, Songfeng (Shenzhen Huazhong University of Science and Technology Research Institute) |
1 | W. Lu, A. L. Varna, M. Wu, "Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization," IEEE Access, vol. 2, pp. 125-141, 2014. DOI |
2 | D. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp.91-110, 2004. DOI |
3 | S. A. Oliveira, A. R. R. Neto, F. N. Bezerra, "A novel genetic algorithms and surf-based approach for image retargeting," Expert Systems with Applications, vol. 44, pp. 332-343, February, 2016. DOI |
4 | H. Bay, A. Ess, T. Tuytelaars, L. V. Gool, "Speeded-up robust features (SURF)," Computer Vision and Image Understanding, vol. 110, no.3, pp. 346-359, June, 2008. DOI |
5 | D. D. Truong, C. S. Ngoc, V. T. Nguyen, M. T. Tran, A. D. Duong, "Local descriptors without orientation normalization to enhance landmark recognition," in Proc. of Knowledge and Systems Engineering, Advances in Intelligent Systems and Computing, vol. 244, pp. 401-413, 2014. |
6 | Y. Yue, T. Finley, F. Radlinski, T. Joachims, "A support vector method for optimizing average precision," in Proc of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 271-278, 23-27 July, 2007. |
7 | B. Bakhache, J. M. Ghazal, S. E. Assad, "Improvement of the security of zigbee by a new chaotic algorithm," IEEE Systems Journal, vol. 8, no. 4, pp.1024-1033, Dec. 2014. DOI |
8 | H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, W. Hu, "Talos: Encrypted query processing for the internet of things," in Proc of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys'15), pp. 197-210, 1-4 November, 2015. |
9 | B. Schneier, "Description of a new variable-length key, 64-bit block cipher (blowfish)," in Fast Software Encryption, Cambridge Security Workshop, pp. 191-204, 14-16 December, 1994. |
10 | P. Kumar, S. B. Rana, "Development of modified {AES} algorithm for data security," International Journal for Light and Electron Optics, vol. 127, no. 4, pp. 2341-2345, February, 2016. DOI |
11 | R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc of the 13th ACM Conference on Computer and Communications Security, pp. 79-88, October 30 - November 03, 2006. |
12 | S. Qiu, J. Liu, Y. Shi, M. Li, W. Wang, "Identity-based private matching over outsourced encrypted datasets," IEEE Transactions on cloud Computing, vol. 6, no. 3, p. 747-759, December, 2015. DOI |
13 | W. Du, M. J. Atallah, "Protocols for secure remote database access with approximate matching," E-Commerce Security and Privacy, vol. 2, pp. 87-111, 2001. DOI |
14 | J. Y. Chun, D. H. Lee, I. R. Jeong, "Privacy-preserving range set union for rare cases in healthcare data," IET Communications, vol. 6, no. 18, pp. 3288-3293, 2012. DOI |
15 | S. Upadhyay, C. Sharma, P. Sharma, P. Bharadwaj, K. Seeja, K "Privacy preserving data mining with 3-d rotation transformation," Journal of King Saud University - Computer and Information Sciences, vol. 30, no. 4, pp.524-530, October, 2018. DOI |
16 | Corel test set. http://InfoLab.Stanford.EDU/-wangz/image.vary.jpg.tar |
17 | W. Liao, "Parallel k-means data clustering", Dec. 5, 2013. http://www.ece.northwestern.edu/-wkliao/Kmeans/index.html |
18 | E. Luo, Q. Liu, J. H. Abawajy, G. Wang, "Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks," Future Generation Computer Systems, vol. 68, pp. 222-233, March, 2017. DOI |
19 | X. Yang, R. Lu, H. Liang, X. Tang, "SFPM: A secure and fine-grained privacy-preserving matching protocol for mobile social networking," Big Data Research, vol. 3, pp. 2-9, April, 2016. DOI |
20 | S. Wang, J. Y. Mao, N. Archer, "On the performance of B2B e-markets: An analysis of organizational capabilities and market opportunities," Electronic Commerce Research and Applications, vol. 11, no. 1, pp. 59-74, February, 2012. DOI |
21 | D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search," in Proc of Springer International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, 2-6 May, 2004. 30 |
22 | H. C. Chen, I. You, C. E. Weng, C. H. Cheng, Y. F. Huang, "A security gateway application for End-to-End M2M communications," Computer Standards and Interfaces, vol. 44, pp. 85-93, February, 2016. DOI |
23 | M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, March, 2013. DOI |
24 | D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data." in Proc of IEEE Symposium on Security and Privacy, pp. 44-55, 14-17 May, 2000. |
25 | C. Wang, N. Cao, J. Li, K. Ren, W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc of IEEE 30th International Conference on Distributed Computing Systems, pp. 253-262, 21-25 June, 2010. |
26 | P. Golle, J. Staddon, B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc of Second International Springer Conference of Applied Cryptography and Network Security, pp. 31-45, 8-11 June, 2004. |
27 | C. Liu, L. Zhu, L. Li, Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," in Proc of IEEE International Conference on cloud Computing and Intelligence Systems, pp. 269-273, 15-17 Sept., 2011. |
28 | W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, H. Li, H, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 71-82, 8-10 May, 2013. |
29 | W. Zhang, Y. Lin, S. Xiao, J. Wu, S. Zhou, S, "Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing," IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566-1577, May, 2016. DOI |
30 | J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc of INFOCOM, pp. 1-5, 14-19 March, 2010. |
31 | B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc of IEEE Conference on Computer Communications, pp. 2112-2120, 27 April-2 May, 2014. |
32 | W. Lu, A. Swaminathan, A.L.Varna, M. Wu, "Enabling search over encrypted multimedia databases," in Proc. of Springer Media Forensics and Security, SPIE, vol. 7254, pp. 18-29, 18-22 January, 2009. |
33 | F. Perronnin, Y. Liu, J. Sanchez, H. Poirier, "Large-scale image retrieval with compressed fisher vectors," in Proc of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3384-3391, 13-18 June, 2010. |
34 | M. Douze, A. Ramisa, C. Schmid, "Combining attributes and fisher vectors for efficient image retrieval, " in Proc of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 745-752, 20-25 June, 2011. |
35 | C. Y. Hsu, C. S. Lu, S. C. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT," IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593-4607, Nov., 2012. DOI |