Kayani et al., 2024 - Google Patents
Privacy preserving content based image retrievalKayani et al., 2024
- Document ID
- 7044708552220785452
- Author
- Kayani M
- Riaz M
- Ghafoor A
- Khan F
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
The rapid and tremendous growth of multimedia content has motivated users and organizations to upload their large scale digital content on the cloud server which makes the security of data an important issue. To overcome the problem of security in content based …
- 238000000034 method 0 abstract description 82
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | A novel image encryption cryptosystem based on true random numbers and chaotic systems | |
Xia et al. | A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing | |
Khan et al. | DNA key based visual chaotic image encryption | |
Gan et al. | Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption | |
Guo et al. | A quantum image encryption algorithm based on the Feistel structure | |
Kayani et al. | Privacy preserving content based image retrieval | |
Kamrani et al. | A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory | |
Kengnou Telem et al. | A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network | |
Bao et al. | Image scrambling adversarial autoencoder based on the asymmetric encryption | |
Liu et al. | A color image encryption scheme based on a novel 3d chaotic mapping | |
Liu et al. | Secure real-time image protection scheme with near-duplicate detection in cloud computing | |
Majhi et al. | Secure content‐based image retrieval using modified Euclidean distance for encrypted features | |
Abdelfatah et al. | Encryption for multimedia based on chaotic map: Several scenarios | |
Ma | Research and application of big data encryption technology based on quantum lightweight image encryption | |
Wang et al. | Image encryption algorithm based on lattice hash function and privacy protection | |
Mohamed et al. | Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system | |
Zhao et al. | An image encryption approach based on a novel two-dimensional chaotic system | |
Wang et al. | Image encryption algorithm using multi-base diffusion and a new four-dimensional chaotic system | |
Gao et al. | An Image Encryption Algorithm Based on the Improved Sine‐Tent Map | |
Cheng et al. | A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy | |
Zhang et al. | Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform | |
Cheng et al. | Novel One‐Dimensional Chaotic System and Its Application in Image Encryption | |
Amaithi Rajan | EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing | |
Aldin et al. | Quad-color image encryption based on Chaos and Fibonacci Q-matrix | |
Dhingra et al. | Novel multiple video encryption scheme using two-chaotic-map-based two-level permutation and diffusion |