Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








364 Hits in 6.6 sec

A survey on Content Based Image Retrieval in Cloud Environment with Privacy Preservation & Copy Deterrence

Monika Bansode
2021 International Journal for Research in Applied Science and Engineering Technology  
The purpose of this study is to provide privacy preservation and copy deterrence Content Based Image Retrieval method using Lucene Indexing. Keywords: CBIR, Lucene Indexing, Copy Deterrence.  ...  Abstract: Importance of images in day to day life increased tremendously. Therefore Content Based Image Retrieval studied extensively.  ...  "A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing" IEEE Transaction (2016): In this two privacy threats are described as curious cloud serve look for additional  ... 
doi:10.22214/ijraset.2021.37852 fatcat:x3ynu567zvgt5idquu3clo5b2e

A review of the state of the arts in privacy and security in the eHealth cloud

Aqeel Sahi, David Lai, Yan Li
2021 IEEE Access  
A different approach based on the FHE was proposed to preserve the privacy of health data in a public cloud [90, 91] .  ...  a biometric-based IMS to preserve the privacy of the cloud project's information [19] .  ...  It covers the most recent studies in this research area, and discusses the benefits and drawbacks of most important literature to help improve the security and privacy of eHealth clouds.  ... 
doi:10.1109/access.2021.3098708 fatcat:u6b4oflz2ndxtbape5becffffu

Relevance Feedback Utilizing Secure Evaluation with Content-based Image Retrieval in Cloud Computing

Sonali Sakhahari Panchal, Shital Y Gaikwad
2019 Advanced Journal of Graduate Research  
Content-based image retrieval (CBIR) is the integrated system of the photograph fetching trouble for instance difficulty of chasing down pictures on a cloud in big datasets.  ...  In the watermark-primarily based tradition, a singular watermark is explicitly inserted in blended photos by means of the cloud environment earlier than photos, transmitted towards inquiry mortal.  ...  [1] focused on CBIR with preserving privacy and copy deterrence in Cloud Computing.  ... 
doi:10.21467/ajgr.6.1.31-40 fatcat:jrelkvrwbnbqlkjyffkf5wh5cy

Secure and duplication detection in cloud using cryptographic hashing method

J. K. Periasamy, B. Latha
2018 International Journal of Engineering & Technology  
In order to check the leakage of such side channel data, the work accept the custom and design a proof of rights protocol amid cloud servers and clients, which permit clients to confirm the cloud servers  ...  In accumulation, Secure Cloud also enables secure de-duplication. Perceive that the "validity" measured in Secure Cloud is the deterrence of leakage, the side channel information.  ...  To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. The authors evaluate the scheme's performance based on analysis and implementation.  ... 
doi:10.14419/ijet.v7i1.7.9585 fatcat:3pczwpr7q5hahceqy7nv56dow4

Fog Based Three-Layer Architecture for Privacy Preserving

2020 International Journal of Engineering and Advanced Technology  
Privacy to the users data is main issue in the present cloud computing.  ...  Because public clouds are not secure enough and users doesn't know where data is storing in cloud servers.  ...  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme Cloud servers contains large amount of data with huge number of users information.  ... 
doi:10.35940/ijeat.e1010.069520 fatcat:zx6gtjkoavaqtezj4ng7wy5iay

Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao
2017 Security and Communication Networks  
privacy.  ...  We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.  ...  [39] proposed a privacy-preserving and copy-deterrence CBIR scheme using encryption and watermarking techniques, which can prevent the image user from illegally distributing the retrieved images.  ... 
doi:10.1155/2017/4603237 fatcat:6jds3tvwcjatxmhl2xj5meqhjm

A Comprehensive Survey of the Internet of Things (IoT) and Edge Computing in Healthcare

Fatima Alshehri, Ghulam Muhammad
2020 IEEE Access  
We survey this literature by answering several research areas on IoT and IoMT, AI, edge and cloud computing, security, and medical signals fusion.  ...  Here, we present a comprehensive survey of IoT-and IoMTbased edge-intelligent smart health care, mainly focusing on journal articles published between 2014 and 2020.  ...  EDGE-INTELLIGENT AND CLOUD-BASED SMART HEALTH CARE An edge-or cloud-based privacy-preserved automatic emotion recognition system utilizing a CNN was proposed in [55] .  ... 
doi:10.1109/access.2020.3047960 fatcat:adbkd6gfg5dtnigtumglmtsecu

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques.  ...  In particular, it contains security and dependability component specfications, descriptions of distributed protocols, specifications of cryptographic mechanisms, and descriptions of the data-resilience  ...  Image Processing Techniques Content Based Image Retrieval Content Based Image Retrieval (CBIR) is a solution for the image retrieval problem to search for images in databases, one important application  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

A survey of privacy-preserving mechanisms for heterogeneous data types

Mariana Cunha, Ricardo Mendes, João P. Vilela
2021 Computer Science Review  
In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection.  ...  Beyond the benefits that accrue for the users, there are private and sensitive information that is exposed. Therefore, Privacy-Preserving Mechanisms (PPMs) are crucial to protect users' privacy.  ...  Content-based Image Retrieval (CBIR) is a well-studied problem in image processing that consists in analyzing and retrieving the information contained in image data.  ... 
doi:10.1016/j.cosrev.2021.100403 fatcat:g77hxznnjfdxjjj52sxsjenlzy

A novel method for multifactorial bio-chemical experiments design based on combinational design theory

Xun Wang, Beibei Sun, Boyang Liu, Yaping Fu, Pan Zheng, Xiangxiang Zeng
2017 PLoS ONE  
Finally, a software based on the proposed method is developed for designing experiments with covering influencing factors a certain number of times.  ...  In this work, borrowing the concept of "balance" in combinatorial design theory, a novel method for multifactorial bio-chemical experiments design is proposed, where balanced templates in combinational  ...  data [20] , a privacy-preserving and copy-deterrence content for image data processing with retrieval scheme in cloud computing [21] , and machine learning method have been applied for experimental  ... 
doi:10.1371/journal.pone.0186853 pmid:29095845 pmcid:PMC5667848 fatcat:lhyvzmebdfhafmlalajfqlela4

Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges [article]

Linh T. Nguyen, Lam Duc Nguyen, Thong Hoang, Dilum Bandara, Qin Wang, Qinghua Lu, Xiwei Xu, Liming Zhu, Petar Popovski, Shiping Chen
2023 arXiv   pre-print
In this paper, we conduct a comprehensive survey on blockchain-based data-sharing architectures and applications to fill the gap.  ...  Given many related works proposes blockchain-based trustworthy data-sharing solutions, there is increasing confusion and difficulties in understanding and selecting these technologies and platforms in  ...  IPFS introduces the concept of content addressing when content can be retrieved based on a content-based routing mechanism rather than its location like in traditional protocols.  ... 
arXiv:2303.06546v1 fatcat:yoatntymrfb77lpkotp4ovxwti

Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security

Lirong Qiu, Jie Li
2017 Complexity  
Multimedia applications in smart electronic commerce (e-commerce), such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos.  ...  This system does not touch users' privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics.  ...  Acknowledgments This work is supported by the National Nature Science Foundation of China (no. 61672553) and Project of Humanities and Social Sciences (the Ministry of Education in China) (no. 16YJCZH076  ... 
doi:10.1155/2017/6254842 fatcat:2yehtaru7zajrm4cjrr65gc5w4

Permacoin: Repurposing Bitcoin Work for Data Preservation

Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
2014 2014 IEEE Symposium on Security and Privacy  
Our scheme involves an alternative scratch-off puzzle for Bitcoin based on Proofs-of-Retrievability (PORs). Successfully minting money with this SOP requires local, random access to a copy of a file.  ...  We also provide parameterizations and calculations based on realistic hardware constraints to demonstrate the practicality of Permacoin as a whole.  ...  This research was funded in part by NSF under grant numbers CNS-1223623 and CNS-1314857, and by a Google Faculty Research Award.  ... 
doi:10.1109/sp.2014.37 dblp:conf/sp/MillerJSPK14 fatcat:ognfv3ktzjg7bn277fbnjf2h7i

Digital Forensics Curriculum in Security Education

S. Srinivasan
2013 Journal of Information Technology Education Innovations in Practice  
As individuals and businesses have come to rely more heavily on computing technology, criminals also have turned their attention to such technology.  ...  In either case, we need to expose the students specializing in security education to both the technology and the legal aspects. Editors: Beth Thomsett-Scott and Linda V.  ...  A bit-stream image is a copy of all storage content bit-by-bit. This way all hidden and deleted files will be found.  ... 
doi:10.28945/1857 fatcat:ze4gio3hpbgnzgckawflvzpalm

Secure Auditing Scheme with Content-Based Image Retrieval using Human Interaction (RF) in Cloud Computing Environment

Ms Sonali, S Panchal, Ms Shital, Y Gaikwad, Mr Kamthane
2018 unpublished
There are two types of image search, Image Meta Search and Content-Based Image Retrieval (CBIR). CBIR is the mainframe of image retrieval system.  ...  In the watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user.  ...  " focused on preserving privacy and doing copy deterrence while retrieving content based images in a cloud computing environment.  ... 
fatcat:xkncaj3ykrhbln6oxvjxtaa5g4
« Previous Showing results 1 — 15 out of 364 results