{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:52:29Z","timestamp":1762375949041,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_20","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"311-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties"],"prefix":"10.1007","author":[{"given":"Bernardo","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Leit\u00e3o","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Domingos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"20_CR1","unstructured":"Global Web Index: Instagram tops the list of social network growth (2013). http:\/\/blog.globalwebindex.net\/instagram-tops-list-of-growth"},{"key":"20_CR2","unstructured":"Rushe, D.: Google: don\u2019t expect privacy when sending to Gmail. The Guardian (2013). http:\/\/tinyurl.com\/kjga34x"},{"key":"20_CR3","unstructured":"Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. The Guardian (2013). http:\/\/tinyurl.com\/oea3g8t"},{"key":"20_CR4","unstructured":"Chen, A.: GCreep: Google Engineer Stalked Teens, Spied on Chats. Gawker (2010). http:\/\/gawker.com\/5637234"},{"issue":"5","key":"20_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J Halderman","year":"2009","unstructured":"Halderman, J., Schoen, S.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2063509.2063512","volume":"29","author":"P Mahajan","year":"2011","unstructured":"Mahajan, P., et al.: Depot: cloud storage with minimal trust. ACM Trans. Comput. Syst. 29(4), 1\u201338 (2011)","journal-title":"ACM Trans. Comput. Syst."},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1007\/978-3-642-32009-5_49","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850\u2013867. Springer, Heidelberg (2012)"},{"issue":"11","key":"20_CR8","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu, C.Y., et al.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593\u20134607 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Lu, W., et al.: Enabling search over encrypted multimedia databases. In: IS&T\/SPIE Electron. Imaging, ISOP, February 2009. 725418\u2013725418-11","DOI":"10.1117\/12.806980"},{"key":"20_CR10","unstructured":"Song, D.X., et al.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44\u201355. IEEE (2000)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal, R., et al.: Order preserving encryption for numeric data. In: Proceedings SIGMOD, pp. 563\u2013574. ACM (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"Taher El Gamal","year":"1985","unstructured":"El Gamal, Taher: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, David (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"issue":"1","key":"20_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BF00130487","volume":"7","author":"MJ Swain","year":"1991","unstructured":"Swain, M.J., Ballard, D.H.: Color indexing. Int. J. Comput. Vis. 7(1), 11\u201332 (1991)","journal-title":"Int. J. Comput. Vis."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T07:49:11Z","timestamp":1676015351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}