{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T14:35:48Z","timestamp":1721831748177},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2018YFB0804702"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11042-022-12880-6","type":"journal-article","created":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T17:02:50Z","timestamp":1649437370000},"page":"31219-31243","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing content-based image retrieval on the cloud using generative models"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0422-5691","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fan-chuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiao-hu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"12880_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal S, Freeman DM, Vaikuntanathan V (2011) Functional encryption for inner product predicates from learning with errors. In: Lee DH, Wang X (eds) Advances in cryptology \u2013 ASIACRYPT 2011. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 21\u201340","DOI":"10.1007\/978-3-642-25385-0_2"},{"issue":"12","key":"12880_CR2","doi-asserted-by":"publisher","first-page":"18839","DOI":"10.1007\/s11042-021-10646-0","volume":"80","author":"M Bansal","year":"2021","unstructured":"Bansal M, Kumar M, Kumar M (2021) 2d object recognition: a comparative analysis of sift, surf and orb feature descriptors. Multimedia Tools and Applications 80(12):18839\u201318857","journal-title":"Multimedia Tools and Applications"},{"key":"12880_CR3","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s00500-020-05453-y","volume":"25","author":"M Bansal","year":"2021","unstructured":"Bansal M, Kumar M, Kumar M, Kumar K (2021) An efficient technique for object recognition using shi-tomasi corner detection algorithm. Soft Computing 25:4423\u20134432","journal-title":"Soft Computing"},{"key":"12880_CR4","doi-asserted-by":"crossref","unstructured":"Bansal M, Kumar M, Sachdeva M, Mittal A (2021) Transfer learning for image classification using vgg19: Caltech-101 image data set. Journal of Ambient Intelligence and Humanized Computing","DOI":"10.1007\/s12652-021-03488-z"},{"key":"12880_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (Oct 2011) Efficient Fully Homomorphic Encryption from (Standard) LWE. In: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp 97\u2013106","DOI":"10.1109\/FOCS.2011.12"},{"key":"12880_CR6","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Proceedings of the 31st annual conference on advances in cryptology, ser. CRYPTO\u201911. Springer-Verlag, Berlin, Heidelberg, pp 505\u2013524","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"12880_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti I, Gama N, Georgieva M (2020) TFHE: Fast Fully Homomorphic Encryption Over the Torus. J Cryptol 33:34\u201391","journal-title":"J Cryptol"},{"key":"12880_CR8","doi-asserted-by":"crossref","unstructured":"Chillotti I, Gama N, Georgieva M (2016) Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In: Cheon JH, Takagi T (eds) Advances in cryptology \u2013 ASIACRYPT 2016. Springer, Berlin, Heidelberg, pp 3\u201333","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"12880_CR9","unstructured":"Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J (Feb 2016) CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. Microsoft Research, Tech. Rep. MSR-TR-2016-3"},{"key":"12880_CR10","doi-asserted-by":"crossref","unstructured":"Elgamal T (July 1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4):469\u2013","DOI":"10.1109\/TIT.1985.1057074"},{"key":"12880_CR11","doi-asserted-by":"crossref","unstructured":"Ferreira B, Rodrigues J, Leit?o J, Domingos H (Sept 2015) Privacy-Preserving Content-Based Image Retrieval in the Cloud. In: 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp 11\u201320","DOI":"10.1109\/SRDS.2015.27"},{"key":"12880_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of cryptography. Basic Applications, vol 2","author":"O Goldreich","year":"2004","unstructured":"Goldreich O (2004) Foundations of cryptography. Basic Applications, vol 2. Cambridge University Press, New York"},{"issue":"1","key":"12880_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18(1):186\u2013208","journal-title":"SIAM J Comput"},{"key":"12880_CR14","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks"},{"key":"12880_CR15","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"12880_CR16","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville A (2017) Improved training of wasserstein gans"},{"key":"12880_CR17","doi-asserted-by":"crossref","unstructured":"Hastings M, Hemenway B, Noble D, Zdancewic S (May 2019) SoK: General Purpose Compilers for Secure Multi-Party Computation. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 1220\u20131237","DOI":"10.1109\/SP.2019.00028"},{"issue":"11","key":"12880_CR18","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Transactions on Image Processing 21 (11):4593\u20134607","journal-title":"IEEE Transactions on Image Processing"},{"issue":"7","key":"12880_CR19","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1109\/TIP.2016.2568460","volume":"25","author":"S Hu","year":"2016","unstructured":"Hu S, Wang Q, Wang J, Qin Z, Ren K (2016) Securing sift: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Transactions on Image Processing 25(7):3411\u20133425","journal-title":"IEEE Transactions on Image Processing"},{"key":"12880_CR20","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: A low latency framework for secure neural network inference. In: 27th USENIX security symposium (USENIX security 18). Baltimore, MD: USENIX Association, pp 1651\u20131669"},{"key":"12880_CR21","doi-asserted-by":"crossref","unstructured":"Kumar A, Kumar M, Kaur A (2021) Face detection in still images under occlusion and non-uniform illumination. Multimedia Tools and Applications, vol. 80","DOI":"10.1007\/s11042-020-10457-9"},{"key":"12880_CR22","doi-asserted-by":"crossref","unstructured":"Li P, Li T, Yao Z-A, Tang C-M, Li J (Aug 2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Computing 21(15):4349\u20134359","DOI":"10.1007\/s00500-016-2066-5"},{"key":"12880_CR23","doi-asserted-by":"publisher","first-page":"119209","DOI":"10.1109\/ACCESS.2019.2935222","volume":"7","author":"F Liu","year":"2019","unstructured":"Liu F, Wang Y, Wang F, Zhang Y, Lin J (2019) Intelligent and secure content-based image retrieval for mobile users. IEEE Access 7:119209\u2013119222","journal-title":"IEEE Access"},{"key":"12880_CR24","doi-asserted-by":"crossref","unstructured":"Mao Q, Wang L, Tsang IW (May 2017) A unified probabilistic framework for robust manifold learning and embedding. Mach Learn 106(5):627\u2013650","DOI":"10.1007\/s10994-016-5602-8"},{"key":"12880_CR25","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A (May 2019) Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 739\u2013753","DOI":"10.1109\/SP.2019.00065"},{"key":"12880_CR26","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: IN ADVANCES IN CRYPTOLOGY - EUROCRYPT 1999. Springer-Verlag, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"12880_CR27","unstructured":"Samangouei P, Kabkab M, Chellappa R (2018) Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models. ArXiv, 1805.06605. access date 2018.05.18"},{"key":"12880_CR28","doi-asserted-by":"crossref","unstructured":"Singh S, Ahuja U, Kumar M, Kumar K, Sachdeva M (2021) Face mask detection using yolov3 and faster r-cnn models: Covid-19 environment. Multimedia Tools and Applications, vol. 80","DOI":"10.1007\/s11042-021-10711-8"},{"key":"12880_CR29","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks"},{"key":"12880_CR30","unstructured":"Wang X, He K, Song C, Wang L, Hopcroft JE (2019) At-gan: An adversarial generator model for non-constrained adversarial examples"},{"key":"12880_CR31","doi-asserted-by":"crossref","unstructured":"Wang Z, Song M, Zhang Z, Song Y, Wang Q, Qi H (2019) Beyond inferring class representatives: User-level privacy leakage from federated learning. In: IEEE INFOCOM 2019 - IEEE conference on computer communications, pp 2512\u20132520","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"12880_CR32","unstructured":"Zahur S, Evans D (2015) Obliv-C: A language for extensible data-oblivious computation. Cryptology ePrint Archive, Report 2015\/1153. https:\/\/eprint.iacr.org\/2015\/1153"},{"key":"12880_CR33","doi-asserted-by":"crossref","unstructured":"Zheng P, Huang J (2013) An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Proceedings of the 21st ACM International conference on multimedia, ser. MM \u201913. New York, NY, USA: ACM, pp 803\u2013812","DOI":"10.1145\/2502081.2502105"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12880-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12880-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12880-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T05:07:48Z","timestamp":1661144868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12880-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,8]]},"references-count":33,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["12880"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12880-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,8]]},"assertion":[{"value":"17 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}