{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:08:51Z","timestamp":1742958531104,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242640"},{"type":"electronic","value":"9783030242657"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_52","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"606-616","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Content Based Image Retrieval Scheme in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Zhuohua","family":"Liu","sequence":"first","affiliation":[]},{"given":"Caijuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Suo","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"52_CR1","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.ins.2014.03.123","volume":"279","author":"J Yin","year":"2014","unstructured":"Yin, J., Lu, X., Chen, H., Zhao, X., Xiong, N.N.: System resource utilization analysis and prediction for cloud based applications under bursty workloads. Inf. Sci. 279, 338\u2013357 (2014)","journal-title":"Inf. Sci."},{"key":"52_CR2","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1080\/01621459.2000.10474260","volume":"95","author":"G Duncan","year":"2000","unstructured":"Duncan, G., Mukherjee, S.: Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise. Publ. Am. Stat. Assoc. 95, 720\u2013729 (2000)","journal-title":"Publ. Am. Stat. Assoc."},{"key":"52_CR3","first-page":"229","volume":"55","author":"Q Cui","year":"2018","unstructured":"Cui, Q., Mcintosh, S., Sun, H.: Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs. Comput. Mater. Contin. 55, 229\u2013241 (2018)","journal-title":"Comput. Mater. Contin."},{"key":"52_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.32604\/cmc.2018.02617","volume":"57","author":"S Zhou","year":"2018","unstructured":"Zhou, S., Liang, W., Li, J., Kim, J.-U.: Improved VGG model for road traffic sign recognition. Comput. Mater. Contin. 57, 11\u201324 (2018)","journal-title":"Comput. Mater. Contin."},{"key":"52_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/BFb0032418","volume-title":"Advances in Database Technology - EDBT 1992","author":"K Hirata","year":"1992","unstructured":"Hirata, K., Kato, T.: Query by visual example - content based image retrieval. In: Pirotte, A., Delobel, C., Gottlob, G. (eds.) Advances in Database Technology - EDBT 1992. LNCS, vol. 580, pp. 56\u201371. Springer, Heidelberg (1992). \nhttps:\/\/doi.org\/10.1007\/BFb0032418"},{"key":"52_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48\u201363 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: Media Forensics and Security I, p. 725418 (2009)","DOI":"10.1117\/12.806980"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533\u20131536 (2009)","DOI":"10.1109\/ICASSP.2009.4959888"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Y., Miao, M., Shen, J., Wang, J.: Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput. 1\u201312 (2017)","DOI":"10.1007\/s00500-017-2927-6"},{"key":"52_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Costa, L.d.F., Rodrigues, F.A., Travieso, G., Boas, P.R.V.: Characterization of complex networks: a survey of measurements. Adv. Phys. 56, 167\u2013242 (2007)","DOI":"10.1080\/00018730601170527"},{"key":"52_CR12","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TPAMI.2007.70792","volume":"30","author":"J Li","year":"2008","unstructured":"Li, J., Wang, J.Z.: Real-time computerized annotation of pictures. IEEE Trans. Pattern Anal. Mach. Intell. 30, 985 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"52_CR13","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jvcir.2017.01.006","volume":"43","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.Q.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164\u2013172 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"52_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/2978574","volume":"12","author":"Z Qin","year":"2016","unstructured":"Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: SecSIFT: secure image SIFT feature extraction in cloud computing. ACM Trans. Multimed. Comput. Commun. Appl. 12, 65 (2016)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T16:24:46Z","timestamp":1594311886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}