{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:47:55Z","timestamp":1743086875046,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_68","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"727-735","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Unsupervised Searching Scheme over Encrypted Cloud Database"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5354-4058","authenticated-orcid":false,"given":"T.","family":"Janani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3952-0674","authenticated-orcid":false,"given":"M.","family":"Brindha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22\u201323 June 2010, pp. 380\u2013383","DOI":"10.1109\/ICICCI.2010.119"},{"key":"68_CR2","unstructured":"Furukawa, J.: Request-based comparable encryption. In: Computer Security\u2014ESORICS 2013\u201418th European Symposium on Research in Computer Security, Egham, UK, 9\u201313 Sept 2013. Proceedings, vol. 8134, pp. 129\u2013146 (2013)"},{"issue":"11","key":"68_CR3","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"68_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Di, X.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1), 74\u201382 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"16\u201317","key":"68_CR5","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu, H., Wang, X.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284(16\u201317), 3895\u20133903 (2011)","journal-title":"Opt. Commun."},{"key":"68_CR6","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math Appl. 59, 3320\u20133327 (2010)","journal-title":"Comput. Math Appl."},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Ye, J., Xu, Z., Ding, Y.: Image search scheme over encrypted database. Future Gener. Comput. Syst. (2018)","DOI":"10.1016\/j.future.2018.02.045"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Salahat, E., Qasaimeh, M.: Recent advances in features extraction and description algorithms: a comprehensive survey. In: 2017 IEEE International Conference on Industrial Technology (ICIT), pp. 1059\u20131063. IEEE (2017)","DOI":"10.1109\/ICIT.2017.7915508"},{"key":"68_CR9","first-page":"91","volume":"2","author":"G Lowe","year":"2004","unstructured":"Lowe, G.: SIFT-the scale invariant feature transform. Int. J 2, 91\u2013110 (2004)","journal-title":"Int. J"},{"issue":"1","key":"68_CR10","first-page":"6","volume":"1","author":"RS Choras","year":"2007","unstructured":"Choras, R.S.: Image feature extraction techniques and their applications for CBIR and biometrics systems. Int. J. Biol. Biomed. Eng. 1(1), 6\u201316 (2007)","journal-title":"Int. J. Biol. Biomed. Eng."},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Gudmundsson, G.\u00de., Jonsson, B.\u00de., Amsaleg, L.: A large-scale performance study of cluster-based high-dimensional indexing. In: Proceedings of the International Workshop on Very-Large-Scale Multimedia Corpus, Mining and Retrieval (pp. 31\u201336). ACM (2010)","DOI":"10.1145\/1878137.1878145"},{"key":"68_CR12","first-page":"5640","volume":"5","author":"W Yang","year":"2017","unstructured":"Yang, W., Hou, K., Liu, B., Fanhua, Yu., Lin, L.: Two-stage clustering technique based on the neighboring union histogram for hyperspectral remote sensing images. IEEE Access 5, 5640\u20135647 (2017)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:15:40Z","timestamp":1599552940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}