{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:31:15Z","timestamp":1725971475924},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_32","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T11:10:42Z","timestamp":1521630642000},"page":"326-336","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Preserving Hu\u2019s Moments in Encrypted Domain"],"prefix":"10.1007","author":[{"given":"G.","family":"Preethi","sequence":"first","affiliation":[]},{"given":"Aswani Kumar","family":"Cherukuri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of EUROCRYPT-99, pp. 223\u2013238. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D thesis. Stanford University, September 2009. http:\/\/crypto.stanford.edu\/craig","DOI":"10.1145\/1536414.1536440"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Proceedings of Eurocrypt-10. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS 2011 Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97\u2013106 (2011)","DOI":"10.1109\/FOCS.2011.12"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Advances in Cryptology CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"32_CR7","unstructured":"Fan, J., Vercauteren, F.: Somewhat Practical Fully Homomorphic Encryption, Cryptology ePrint Archive, Report 2012\/144 (2012). http:\/\/eprint.iacr.org\/2012\/144"},{"key":"32_CR8","unstructured":"Aslett, L.J.M., Esperan, P.M., Holmes, C.C.: A Review of Homomorphic Encryption and Software Tools for Encrypted Statistical Machine Learning, Technical Report. University of Oxford (2015)"},{"issue":"2","key":"32_CR9","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1002\/sec.982","volume":"8","author":"T Baby","year":"2015","unstructured":"Baby, T., Cherukuri, A.K.: On query execution over encrypted data. Secur. Commun. Netw. 8(2), 321\u2013331 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 4593\u20134607 (2012). https:\/\/doi.org\/10.1109\/TIP.2012.2204272","journal-title":"IEEE Trans. Image Process."},{"key":"32_CR11","doi-asserted-by":"publisher","unstructured":"Bai, Y., Zhuo, L., Cheng, B. and Peng, Y. F.: Surf feature extraction in encrypted domain. In: IEEE International Conference on Multimedia and Expo (2014). https:\/\/doi.org\/10.1109\/ICME.2014.6890170","DOI":"10.1109\/ICME.2014.6890170"},{"key":"32_CR12","first-page":"179","volume":"IT\u201308","author":"M Hu","year":"1962","unstructured":"Hu, M.: Visual pattern recognition by moment invariants. IRE Trans. Inf. Theor. IT\u201308, 179\u2013187 (1962)","journal-title":"IRE Trans. Inf. Theor."},{"key":"32_CR13","doi-asserted-by":"publisher","unstructured":"Huang, Z., Leng, J.: Analysis of Hu\u2019s moment invariants on image scaling and rotation. In: 2nd International Conference on Computer Engineering and Technology, pp. 476\u2013480 (2010). https:\/\/doi.org\/10.1109\/ICCET.2010.5485542","DOI":"10.1109\/ICCET.2010.5485542"},{"key":"32_CR14","unstructured":"Urooj, S., Singh, S.P.: Geometric invariant feature extraction of medical images using Hu\u2019s invariants. In: 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1560\u20131562 (2016)"},{"key":"32_CR15","doi-asserted-by":"publisher","unstructured":"Isnanto, R.R., Zahra, A.A., Julietta, P.: Pattern recognition on herbs leaves using region-based invariants feature extraction. In: 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, pp. 455\u2013459 (2016). https:\/\/doi.org\/10.1109\/ICITACEE.2016.7892491","DOI":"10.1109\/ICITACEE.2016.7892491"},{"key":"32_CR16","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.3233\/BME-151426","volume":"26","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y.: Pathological brain detection based on wavelet entropy and Hu moment invariants. Bio-Med. Mater. Eng. 26, 1283\u20131290 (2015)","journal-title":"Bio-Med. Mater. Eng."},{"issue":"1","key":"32_CR17","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.patcog.2007.05.001","volume":"41","author":"D Xu","year":"2008","unstructured":"Xu, D., Li, H.: Geometric moment invariants. Pattern Recognit. 41(1), 240\u2013249 (2008)","journal-title":"Pattern Recognit."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T02:47:21Z","timestamp":1570934841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}