[go: up one dir, main page]

Kayani et al., 2024 - Google Patents

Privacy preserving content based image retrieval

Kayani et al., 2024

Document ID
7044708552220785452
Author
Kayani M
Riaz M
Ghafoor A
Khan F
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

The rapid and tremendous growth of multimedia content has motivated users and organizations to upload their large scale digital content on the cloud server which makes the security of data an important issue. To overcome the problem of security in content based …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Zhou et al. A novel image encryption cryptosystem based on true random numbers and chaotic systems
Xia et al. A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing
Khan et al. DNA key based visual chaotic image encryption
Gan et al. Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption
Guo et al. A quantum image encryption algorithm based on the Feistel structure
Kayani et al. Privacy preserving content based image retrieval
Kamrani et al. A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory
Kengnou Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
Bao et al. Image scrambling adversarial autoencoder based on the asymmetric encryption
Liu et al. A color image encryption scheme based on a novel 3d chaotic mapping
Liu et al. Secure real-time image protection scheme with near-duplicate detection in cloud computing
Majhi et al. Secure content‐based image retrieval using modified Euclidean distance for encrypted features
Abdelfatah et al. Encryption for multimedia based on chaotic map: Several scenarios
Ma Research and application of big data encryption technology based on quantum lightweight image encryption
Wang et al. Image encryption algorithm based on lattice hash function and privacy protection
Mohamed et al. Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system
Zhao et al. An image encryption approach based on a novel two-dimensional chaotic system
Wang et al. Image encryption algorithm using multi-base diffusion and a new four-dimensional chaotic system
Gao et al. An Image Encryption Algorithm Based on the Improved Sine‐Tent Map
Cheng et al. A High‐Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Zhang et al. Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform
Cheng et al. Novel One‐Dimensional Chaotic System and Its Application in Image Encryption
Amaithi Rajan EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing
Aldin et al. Quad-color image encryption based on Chaos and Fibonacci Q-matrix
Dhingra et al. Novel multiple video encryption scheme using two-chaotic-map-based two-level permutation and diffusion