{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:03:43Z","timestamp":1730322223652,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3386164.3389099","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:30:15Z","timestamp":1591493415000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment"],"prefix":"10.1145","author":[{"given":"Yanyan","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China"}]},{"given":"Xiao","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China"}]},{"given":"Jiaying","family":"Gong","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314316"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"e_1_3_2_1_3_1","first-page":"253","volume-title":"Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS)","author":"Wang N.","year":"2010","unstructured":"C. Wang , N. Cao , J. Li , K. Ren , W. Lou, Secure ranked keyword search over encrypted cloud data , in: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS) 2010 , pp. 253 -- 262 . C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS) 2010, pp. 253--262."},{"key":"e_1_3_2_1_4_1","first-page":"506","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Boneh G.","year":"2004","unstructured":"D. Boneh , G. Crescenzo , R. Ostrovsky , G. Persiano . Public-key encryption with keyword search , in: Advances in Cryptology - EUROCRYPT 2004 . Springer, Berlin , Heidelberg , 2004, pp. 506 -- 522 . D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano. Public-key encryption with keyword search, in: Advances in Cryptology - EUROCRYPT 2004. Springer, Berlin, Heidelberg, 2004, pp. 506--522."},{"key":"e_1_3_2_1_5_1","first-page":"44","volume-title":"Proceedings of the IEEE Symposium on Research Security and Privacy","author":"Song D.","year":"2000","unstructured":"D. Song , D. Wagner , A. Perrig, Practical techniques for searches in encrypted data , in: Proceedings of the IEEE Symposium on Research Security and Privacy , 2000 , pp. 44 -- 55 . D. Song, D. Wagner, A. Perrig, Practical techniques for searches in encrypted data, in: Proceedings of the IEEE Symposium on Research Security and Privacy, 2000, pp. 44--55."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Erkin Z Franz M Guajardo J etal 2009. Privacy-preserving face recognition. Privacy Enhancing Technologies 235--253 Erkin Z Franz M Guajardo J et al. 2009. Privacy-preserving face recognition. Privacy Enhancing Technologies 235--253","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2007-078943"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.09.012"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories[J]","volume":"2017","author":"Ferreira B","unstructured":"Ferreira B , Rodrigues J , Leitao J , Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories[J] . IEEE Transactions on Cloud Computing , 2017 , PP(99): 1 -- 1 . Ferreira B, Rodrigues J, Leitao J, et al. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories[J]. IEEE Transactions on Cloud Computing, 2017, PP(99):1--1.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_10_1","first-page":"304","volume-title":"Computer Vision-ECCV","author":"Jegou M.","year":"2008","unstructured":"H. Jegou , M. Douze , C. Schmid , Hamming embedding and weak geometric consistency for large scale image search , in: Computer Vision-ECCV , Springer , 2008 , pp. 304 -- 317 . H. Jegou, M. Douze, C. Schmid, Hamming embedding and weak geometric consistency for large scale image search, in: Computer Vision-ECCV, Springer, 2008, pp. 304--317."},{"key":"e_1_3_2_1_11_1","volume-title":"The Seventh International Conference on Emerging Security Information, Systems and Technologies","author":"Ferretti F.","year":"2013","unstructured":"L. Ferretti , F. Pierazzi , M. Colajanni , M. Marchetti . Security and confidentiality solutions for public cloud database services , in: The Seventh International Conference on Emerging Security Information, Systems and Technologies , 2013 . L. Ferretti, F. Pierazzi, M. Colajanni, M. Marchetti. Security and confidentiality solutions for public cloud database services, in: The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of SPIE - The International Society for Optical Engineering","author":"Mell T.","year":"2009","unstructured":"P. Mell , T. Grance , Draft NIST Working Definition of Cloud Computing <http:\/\/csrc.nist.gov\/groups\/SNS\/cloudcomputing\/index.html>, June 2009 Kato T. Database architecture for content-based image retrieval [J] . Proceedings of SPIE - The International Society for Optical Engineering , 1992, 1662:112--123. P. Mell, T. Grance, Draft NIST Working Definition of Cloud Computing <http:\/\/csrc.nist.gov\/groups\/SNS\/cloudcomputing\/index.html>, June 2009 Kato T. Database architecture for content-based image retrieval [J]. Proceedings of SPIE - The International Society for Optical Engineering, 1992, 1662:112--123."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS100327029R"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"volume-title":"Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE","author":"Shashank J","key":"e_1_3_2_1_18_1","unstructured":"Shashank J , Kowshik P , Srinathan K , Private Content Based Image Retrieval[C] , Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE , 2008: 1--8. Shashank J, Kowshik P, Srinathan K, et al. Private Content Based Image Retrieval[C], Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE, 2008:1--8."},{"key":"e_1_3_2_1_19_1","volume-title":"Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision","author":"Sivic J","year":"2003","unstructured":"Sivic J , Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision , 2003 . Proceedings. IEEE Xplore , 2003: 1470-1477 vol. 2 . Sivic J, Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision, 2003. Proceedings. IEEE Xplore, 2003:1470-1477 vol.2."},{"key":"e_1_3_2_1_20_1","volume-title":"Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision","author":"Sivic J","year":"2003","unstructured":"Sivic J , Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision , 2003 . Proceedings. IEEE Xplore , 2003: 1470-1477 vol. 2 . Sivic J, Zisserman A. Video Google: A Text Retrieval Approach to Object Matching in Videos[C]\/\/ IEEE International Conference on Computer Vision, 2003. Proceedings. IEEE Xplore, 2003:1470-1477 vol.2."},{"key":"e_1_3_2_1_21_1","first-page":"725418","volume-title":"International Society for Optics and Photonics","author":"Lu A.","year":"2009","unstructured":"W. Lu , A. Swaminathan , A.L. Varna , M. Wu. Enabling search over encrypted multimedia databases, in: IS&T\/SPIE Electronic Imaging , International Society for Optics and Photonics , 2009 , pp. 725418 - 725418 -11. W. Lu, A. Swaminathan, A.L. Varna, M. Wu. Enabling search over encrypted multimedia databases, in: IS&T\/SPIE Electronic Imaging, International Society for Optics and Photonics, 2009, pp. 725418-725418-11."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2307057"},{"key":"e_1_3_2_1_23_1","first-page":"1533","volume-title":"Proceedings of the IEEE Conference on Acoustics, Speech Signal Processing","author":"Lu A.L.","year":"2009","unstructured":"W. Lu , A.L. Varna , A. Swaminathan , M. Wu, Secure image retrieval through feature protection , in: Proceedings of the IEEE Conference on Acoustics, Speech Signal Processing , 2009 , pp. 1533 -- 1536 . W. Lu, A.L. Varna, A. Swaminathan, M. Wu, Secure image retrieval through feature protection, in: Proceedings of the IEEE Conference on Acoustics, Speech Signal Processing, 2009, pp. 1533--1536."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.955109"},{"volume-title":"ACM","author":"Wengert C","key":"e_1_3_2_1_25_1","unstructured":"Wengert C , Douze M. Bag-of-colors for improved image search[C]\/\/ ACM International Conference on Multimedia . ACM , 2011: 1437--1440. Wengert C, Douze M. Bag-of-colors for improved image search[C]\/\/ ACM International Conference on Multimedia. ACM, 2011:1437--1440."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2590944"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.01.006"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2014.6900669"},{"key":"e_1_3_2_1_29_1","volume-title":"Towards privacy-preserving content-based image retrieval in cloud computing","author":"Xia Y.","year":"2015","unstructured":"Z. Xia , Y. Zhu , X. Sun , et al. , Towards privacy-preserving content-based image retrieval in cloud computing , IEEE Trans. Cloud Comput . ( 2015 ) 1. Z. Xia, Y. Zhu, X. Sun, et al., Towards privacy-preserving content-based image retrieval in cloud computing, IEEE Trans. Cloud Comput. (2015) 1."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2002.1017733"}],"event":{"name":"ISCSIC 2019: 2019 3rd International Symposium on Computer Science and Intelligent Control","acronym":"ISCSIC 2019","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386164.3389099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:46:36Z","timestamp":1673739996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386164.3389099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":30,"alternative-id":["10.1145\/3386164.3389099","10.1145\/3386164"],"URL":"https:\/\/doi.org\/10.1145\/3386164.3389099","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}