A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A survey on Content Based Image Retrieval in Cloud Environment with Privacy Preservation & Copy Deterrence
2021
International Journal for Research in Applied Science and Engineering Technology
The purpose of this study is to provide privacy preservation and copy deterrence Content Based Image Retrieval method using Lucene Indexing. Keywords: CBIR, Lucene Indexing, Copy Deterrence. ...
Abstract: Importance of images in day to day life increased tremendously. Therefore Content Based Image Retrieval studied extensively. ...
"A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing" IEEE Transaction (2016): In this two privacy threats are described as curious cloud serve look for additional ...
doi:10.22214/ijraset.2021.37852
fatcat:x3ynu567zvgt5idquu3clo5b2e
A review of the state of the arts in privacy and security in the eHealth cloud
2021
IEEE Access
A different approach based on the FHE was proposed to preserve the privacy of health data in a public cloud [90, 91] . ...
a biometric-based IMS to preserve the privacy of the cloud project's information [19] . ...
It covers the most recent studies in this research area, and discusses the benefits and drawbacks of most important literature to help improve the security and privacy of eHealth clouds. ...
doi:10.1109/access.2021.3098708
fatcat:u6b4oflz2ndxtbape5becffffu
Relevance Feedback Utilizing Secure Evaluation with Content-based Image Retrieval in Cloud Computing
2019
Advanced Journal of Graduate Research
Content-based image retrieval (CBIR) is the integrated system of the photograph fetching trouble for instance difficulty of chasing down pictures on a cloud in big datasets. ...
In the watermark-primarily based tradition, a singular watermark is explicitly inserted in blended photos by means of the cloud environment earlier than photos, transmitted towards inquiry mortal. ...
[1] focused on CBIR with preserving privacy and copy deterrence in Cloud Computing. ...
doi:10.21467/ajgr.6.1.31-40
fatcat:jrelkvrwbnbqlkjyffkf5wh5cy
Secure and duplication detection in cloud using cryptographic hashing method
2018
International Journal of Engineering & Technology
In order to check the leakage of such side channel data, the work accept the custom and design a proof of rights protocol amid cloud servers and clients, which permit clients to confirm the cloud servers ...
In accumulation, Secure Cloud also enables secure de-duplication. Perceive that the "validity" measured in Secure Cloud is the deterrence of leakage, the side channel information. ...
To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. The authors evaluate the scheme's performance based on analysis and implementation. ...
doi:10.14419/ijet.v7i1.7.9585
fatcat:3pczwpr7q5hahceqy7nv56dow4
Fog Based Three-Layer Architecture for Privacy Preserving
2020
International Journal of Engineering and Advanced Technology
Privacy to the users data is main issue in the present cloud computing. ...
Because public clouds are not secure enough and users doesn't know where data is storing in cloud servers. ...
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme Cloud servers contains large amount of data with huge number of users information. ...
doi:10.35940/ijeat.e1010.069520
fatcat:zx6gtjkoavaqtezj4ng7wy5iay
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
2017
Security and Communication Networks
privacy. ...
We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient. ...
[39] proposed a privacy-preserving and copy-deterrence CBIR scheme using encryption and watermarking techniques, which can prevent the image user from illegally distributing the retrieved images. ...
doi:10.1155/2017/4603237
fatcat:6jds3tvwcjatxmhl2xj5meqhjm
A Comprehensive Survey of the Internet of Things (IoT) and Edge Computing in Healthcare
2020
IEEE Access
We survey this literature by answering several research areas on IoT and IoMT, AI, edge and cloud computing, security, and medical signals fusion. ...
Here, we present a comprehensive survey of IoT-and IoMTbased edge-intelligent smart health care, mainly focusing on journal articles published between 2014 and 2020. ...
EDGE-INTELLIGENT AND CLOUD-BASED SMART HEALTH CARE An edge-or cloud-based privacy-preserved automatic emotion recognition system utilizing a CNN was proposed in [55] . ...
doi:10.1109/access.2020.3047960
fatcat:adbkd6gfg5dtnigtumglmtsecu
Specification Of Security Enablers For Data Management
2016
Zenodo
Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques. ...
In particular, it contains security and dependability component specfications, descriptions of distributed protocols, specifications of cryptographic mechanisms, and descriptions of the data-resilience ...
Image Processing Techniques
Content Based Image Retrieval Content Based Image Retrieval (CBIR) is a solution for the image retrieval problem to search for images in databases, one important application ...
doi:10.5281/zenodo.263831
fatcat:ksk4ze2tuncfbexjzsorjnoabe
A survey of privacy-preserving mechanisms for heterogeneous data types
2021
Computer Science Review
In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection. ...
Beyond the benefits that accrue for the users, there are private and sensitive information that is exposed. Therefore, Privacy-Preserving Mechanisms (PPMs) are crucial to protect users' privacy. ...
Content-based Image Retrieval (CBIR) is a well-studied problem in image processing that consists in analyzing and retrieving the information contained in image data. ...
doi:10.1016/j.cosrev.2021.100403
fatcat:g77hxznnjfdxjjj52sxsjenlzy
A novel method for multifactorial bio-chemical experiments design based on combinational design theory
2017
PLoS ONE
Finally, a software based on the proposed method is developed for designing experiments with covering influencing factors a certain number of times. ...
In this work, borrowing the concept of "balance" in combinatorial design theory, a novel method for multifactorial bio-chemical experiments design is proposed, where balanced templates in combinational ...
data [20] , a privacy-preserving and copy-deterrence content for image data processing with retrieval scheme in cloud computing [21] , and machine learning method have been applied for experimental ...
doi:10.1371/journal.pone.0186853
pmid:29095845
pmcid:PMC5667848
fatcat:lhyvzmebdfhafmlalajfqlela4
Blockchain-Empowered Trustworthy Data Sharing: Fundamentals, Applications, and Challenges
[article]
2023
arXiv
pre-print
In this paper, we conduct a comprehensive survey on blockchain-based data-sharing architectures and applications to fill the gap. ...
Given many related works proposes blockchain-based trustworthy data-sharing solutions, there is increasing confusion and difficulties in understanding and selecting these technologies and platforms in ...
IPFS introduces the concept of content addressing when content can be retrieved based on a content-based routing mechanism rather than its location like in traditional protocols. ...
arXiv:2303.06546v1
fatcat:yoatntymrfb77lpkotp4ovxwti
Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security
2017
Complexity
Multimedia applications in smart electronic commerce (e-commerce), such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. ...
This system does not touch users' privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics. ...
Acknowledgments This work is supported by the National Nature Science Foundation of China (no. 61672553) and Project of Humanities and Social Sciences (the Ministry of Education in China) (no. 16YJCZH076 ...
doi:10.1155/2017/6254842
fatcat:2yehtaru7zajrm4cjrr65gc5w4
Permacoin: Repurposing Bitcoin Work for Data Preservation
2014
2014 IEEE Symposium on Security and Privacy
Our scheme involves an alternative scratch-off puzzle for Bitcoin based on Proofs-of-Retrievability (PORs). Successfully minting money with this SOP requires local, random access to a copy of a file. ...
We also provide parameterizations and calculations based on realistic hardware constraints to demonstrate the practicality of Permacoin as a whole. ...
This research was funded in part by NSF under grant numbers CNS-1223623 and CNS-1314857, and by a Google Faculty Research Award. ...
doi:10.1109/sp.2014.37
dblp:conf/sp/MillerJSPK14
fatcat:ognfv3ktzjg7bn277fbnjf2h7i
Digital Forensics Curriculum in Security Education
2013
Journal of Information Technology Education Innovations in Practice
As individuals and businesses have come to rely more heavily on computing technology, criminals also have turned their attention to such technology. ...
In either case, we need to expose the students specializing in security education to both the technology and the legal aspects. Editors: Beth Thomsett-Scott and Linda V. ...
A bit-stream image is a copy of all storage content bit-by-bit. This way all hidden and deleted files will be found. ...
doi:10.28945/1857
fatcat:ze4gio3hpbgnzgckawflvzpalm
Secure Auditing Scheme with Content-Based Image Retrieval using Human Interaction (RF) in Cloud Computing Environment
2018
unpublished
There are two types of image search, Image Meta Search and Content-Based Image Retrieval (CBIR). CBIR is the mainframe of image retrieval system. ...
In the watermark-based protocol, a unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user. ...
" focused on preserving privacy and doing copy deterrence while retrieving content based images in a cloud computing environment. ...
fatcat:xkncaj3ykrhbln6oxvjxtaa5g4
« Previous
Showing results 1 — 15 out of 364 results