{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:34Z","timestamp":1740099154489,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_32","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T18:15:30Z","timestamp":1536776130000},"page":"349-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding"],"prefix":"10.1007","author":[{"given":"Mingfang","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Guang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"3","key":"32_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3064005","volume":"50","author":"GS Poh","year":"2017","unstructured":"Poh, G.S., Chin, J.J., Yau, W.C., Choo, K.K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. 50(3), 1\u201337 (2017)","journal-title":"ACM Comput. Surv."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S., Guo, L.: SEISA: secure and efficient encrypted image search with access control. In: Jiannong, C., Jie, W. (eds.) 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083\u20132091. IEEE, New York (2015)","DOI":"10.1109\/INFOCOM.2015.7218593"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/ACCESS.2014.2371994","volume":"2","author":"W Lu","year":"2014","unstructured":"Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125\u2013141 (2014)","journal-title":"IEEE Access"},{"issue":"6","key":"32_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.14257\/ijfgcn.2013.6.6.08","volume":"6","author":"Z Xia","year":"2013","unstructured":"Xia, Z., Zhu, Y., Sun, X., et al.: A similarity search scheme over encrypted cloud images based on secure transformation. Int. J. Future Gener. Commun. Netw. 6(6), 71\u201380 (2013)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"issue":"5","key":"32_CR5","doi-asserted-by":"crossref","first-page":"824","DOI":"10.3923\/itj.2014.824.831","volume":"3","author":"Y Zhu","year":"2014","unstructured":"Zhu, Y., Sun, X., Xia, Z., et al.: Enabling similarity search over encrypted images in cloud. Inf. Technol. J. 3(5), 824\u2013831 (2014)","journal-title":"Inf. Technol. J."},{"issue":"8","key":"32_CR6","first-page":"1","volume":"9","author":"Y Zhu","year":"2015","unstructured":"Zhu, Y., Sun, X., Xia, Z., et al.: Secure similarity search over encrypted cloud images. Int. J. Secur. Appl. 9(8), 1\u201314 (2015)","journal-title":"Int. J. Secur. Appl."},{"issue":"11","key":"32_CR7","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1007\/s00500-016-2153-7","volume":"21","author":"Q Zou","year":"2017","unstructured":"Zou, Q., Wang, J., Ye, J., et al.: Efficient and secure encrypted image search in mobile cloud computing. Soft. Comput. 21(11), 2959\u20132969 (2017)","journal-title":"Soft. Comput."},{"issue":"11","key":"32_CR8","doi-asserted-by":"crossref","first-page":"7509","DOI":"10.37622\/IJAER\/11.11.2016.7509-7516","volume":"11","author":"J Hyma","year":"2016","unstructured":"Hyma, J., Kumar, D.S.S., Anand, A., et al.: An efficient privacy preserving medical image retrieval using ROI enabled searchable encryption. Int. J. Appl. Eng. Res. 11(11), 7509\u20137516 (2016)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"11","key":"32_CR9","first-page":"1","volume":"7","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Miao, M., Shen, J., et al.: Towards efficient privacy-preserving encrypted image search in cloud computing. Soft. Comput. 7(11), 1\u201312 (2017)","journal-title":"Soft. Comput."},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Kamal, A.A.A.M., Iwamura, K., Kang, H.: Searchable encryption of image based on secret sharing scheme. In: Furui, S., Liu, R., et al. (eds.) 2017 Asia-Pacific Signal and Information Processing Association Summit and Conference, pp. 1495\u20131503. APSIPA, Hawaii (2017)","DOI":"10.1109\/APSIPA.2017.8282269"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, C., Li, J., Wang, S., et al.: An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain. In: 2017 International Conference on Software Engineering Research, Management and Applications, pp. 135\u2013141. ACM, New York (2017)","DOI":"10.1109\/SERA.2017.7965719"},{"issue":"9","key":"32_CR12","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"EJ Delp","year":"1979","unstructured":"Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335\u20131342 (1979)","journal-title":"IEEE Trans. Commun."},{"issue":"10","key":"32_CR13","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema, M., Mitchell, O.R.: Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 32(10), 1148\u20131157 (1984)","journal-title":"IEEE Trans. Commun."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T17:39:31Z","timestamp":1604943571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}