{"id":"https://openalex.org/W3033471465","doi":"https://doi.org/10.1145/3386164.3389099","title":"A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment","display_name":"A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment","publication_year":2019,"publication_date":"2019-09-25","ids":{"openalex":"https://openalex.org/W3033471465","doi":"https://doi.org/10.1145/3386164.3389099","mag":"3033471465"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386164.3389099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009029522","display_name":"Yanyan Xu","orcid":"https://orcid.org/0000-0002-3357-249X"},"institutions":[{"id":"https://openalex.org/I4210118728","display_name":"State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing","ror":"https://ror.org/02bpap860","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118728"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyan Xu","raw_affiliation_strings":["State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China","institution_ids":["https://openalex.org/I4210118728","https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101480009","display_name":"Zhao Xiao","orcid":"https://orcid.org/0000-0002-6527-0824"},"institutions":[{"id":"https://openalex.org/I4210118728","display_name":"State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing","ror":"https://ror.org/02bpap860","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118728"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Zhao","raw_affiliation_strings":["State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, China","institution_ids":["https://openalex.org/I4210118728","https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665608","display_name":"Jiaying Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I4401726822","display_name":"Ping An (China)","ror":"https://ror.org/004yv2z91","country_code":null,"type":"company","lineage":["https://openalex.org/I4401726822"]}],"countries":[],"is_corresponding":false,"raw_author_name":"Jiaying Gong","raw_affiliation_strings":["Ping An Technology (Shenzhen) Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"Ping An Technology (Shenzhen) Co., Ltd., China","institution_ids":["https://openalex.org/I4401726822"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":61},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9918,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/content-based-image-retrieval","display_name":"Content-Based Image Retrieval","score":0.47792298},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43381235}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8082878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79129887},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6363829},{"id":"https://openalex.org/C2780052074","wikidata":"https://www.wikidata.org/wiki/Q1128648","display_name":"Content-based image retrieval","level":4,"score":0.47792298},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.46748963},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.45746216},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43381235},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.42997226},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41603163},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4033915},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.38451236},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3375824},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.32729274},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.311577},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29063118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20233619},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18126845},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386164.3389099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W179458199","https://openalex.org/W1973393984","https://openalex.org/W2010126199","https://openalex.org/W2048581085","https://openalex.org/W2050770647","https://openalex.org/W2054701320","https://openalex.org/W2095514538","https://openalex.org/W2109026747","https://openalex.org/W2109868644","https://openalex.org/W2112064109","https://openalex.org/W2151103935","https://openalex.org/W2154771901","https://openalex.org/W2166049352","https://openalex.org/W2469486851","https://openalex.org/W2477185671","https://openalex.org/W2525788160","https://openalex.org/W2568520927","https://openalex.org/W2728628993","https://openalex.org/W4237164190","https://openalex.org/W4255514781"],"related_works":["https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2905186525","https://openalex.org/W2900811989","https://openalex.org/W2746816529","https://openalex.org/W2341223103","https://openalex.org/W2322947709","https://openalex.org/W2044706866","https://openalex.org/W2024252608"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,5],"platform":[2],"has":[3,230],"powerful":[4],"capacity":[6],"and":[7,21,31,116,124,144,181,194,212,224,235],"nearly":[8],"infinite":[9],"resource":[10],"pool,":[11],"which":[12],"provides":[13],"a":[14],"strong":[15],"guarantee":[16],"for":[17],"mass":[18],"data":[19,45,61,164],"storage":[20],"computing.":[22],"Considering":[23],"double":[24],"security":[25,46,222,234],"threats":[26],"from":[27],"malicious":[28],"external":[29],"attackers":[30],"\"honest-but-curious\"":[32],"CSP":[33,157],"(cloud":[34],"service":[35],"provider),":[36],"users":[37,178],"need":[38],"to":[39,42,50,103,129,135,149,172,177,179,191],"encrypt":[40,192],"images":[41,49,146,167,193],"ensure":[43],"the":[44,59,88,131,169,203],"before":[47],"outsourcing":[48],"cloud.":[51],"But":[52],"encryption":[53,114,186],"can":[54,120,153,188],"have":[55],"an":[56],"impact":[57],"on":[58,75,158],"necessary":[60],"services,":[62],"such":[63],"as":[64,93],"content":[65],"based":[66,74],"image":[67,138,142],"retrieval":[68,236],"(CBIR).":[69],"A":[70],"secure":[71,137],"CBIR":[72],"method":[73,205],"BoVW":[76,97,219],"(Bag":[77],"of":[78,110],"Visual":[79],"Words)":[80],"model":[81],"under":[82],"cloud":[83],"environment":[84],"is":[85,101,127,206,210],"proposed":[86,204],"in":[87,233],"paper.":[89],"Images":[90],"are":[91,147,175,215],"expressed":[92],"frequency":[94],"histogram":[95],"by":[96,156,197,217],"model,":[98],"orthogonal":[99,125,199],"decomposition":[100],"utilized":[102],"divide":[104],"it":[105],"into":[106],"two":[107],"individual":[108],"parts":[109],"component":[111],"coefficients":[112],"thus":[113],"operation":[115,119,133],"feature":[117,159],"extraction":[118,160],"be":[121,154,189],"executed":[122,155],"separately,":[123],"composition":[126],"used":[128,190],"fuse":[130],"encrypted":[132,141,145],"results":[134,226],"construct":[136],"index.":[139],"After":[140],"index":[143,196],"outsourced":[148],"CSP,":[150],"distance":[151,171],"comparison":[152],"field":[161],"without":[162],"violating":[163],"privacy.":[165],"Encrypted":[166],"with":[168],"closest":[170],"query":[173],"trapdoor":[174],"returned":[176],"decrypt":[180],"obtain":[182],"plain":[183],"images.":[184],"Any":[185],"algorithms":[187],"search":[195],"using":[198,218],"transformation,":[200],"so":[201],"that":[202],"practicable.":[207],"Retrieval":[208],"precision":[209],"improved":[211],"better":[213],"performance":[214],"achieved":[216],"model.":[220],"The":[221],"analysis":[223],"experimental":[225],"show":[227],"our":[228],"scheme":[229],"obvious":[231],"advantages":[232],"performance.":[237]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3033471465","counts_by_year":[],"updated_date":"2024-12-24T07:09:34.970722","created_date":"2020-06-12"}