{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:45:47Z","timestamp":1762623947088,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,11,20]],"date-time":"2017-11-20T00:00:00Z","timestamp":1511136000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572382 and 61702401"],"award-info":[{"award-number":["61572382 and 61702401"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M613083"],"award-info":[{"award-number":["2017M613083"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB0802202"],"award-info":[{"award-number":["2017YFB0802202"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s00500-017-2927-6","type":"journal-article","created":{"date-parts":[[2017,11,20]],"date-time":"2017-11-20T08:45:46Z","timestamp":1511167546000},"page":"2101-2112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Towards efficient privacy-preserving encrypted image search in cloud computing"],"prefix":"10.1007","volume":"23","author":[{"given":"Yuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Meixia","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,20]]},"reference":[{"key":"2927_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R, Kiernan, J, Srikant, R, Xu, Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563\u2013574. ACM","DOI":"10.1145\/1007568.1007632"},{"key":"2927_CR2","doi-asserted-by":"crossref","unstructured":"Andoni, A, Indyk, P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 2006 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS\u201906., pp. 459\u2013468","DOI":"10.1109\/FOCS.2006.49"},{"key":"2927_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D, Di\u00a0Crescenzo, G, Ostrovsky, R, Persiano, G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506\u2013522. Springer","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2927_CR4","doi-asserted-by":"crossref","unstructured":"Broder, A.Z, Charikar, M, Frieze, A.M, Mitzenmacher (1998) M Min-wise independent permutations. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 327\u2013336. ACM","DOI":"10.1145\/276698.276781"},{"issue":"11","key":"2927_CR5","doi-asserted-by":"publisher","first-page":"4589","DOI":"10.1007\/s00500-015-1766-6","volume":"20","author":"P Chen","year":"2016","unstructured":"Chen P, Ye J, Chen X (2016) Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput 20(11):4589\u20134596","journal-title":"Soft Comput"},{"key":"2927_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, B, Zhuo, L, Bai, Y, Peng, Y, Zhang, J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing (BdCloud), pp. 116\u2013120. IEEE","DOI":"10.1109\/BDCloud.2014.36"},{"key":"2927_CR7","doi-asserted-by":"crossref","unstructured":"Datar, M, Immorlica, N, Indyk, P, Mirrokni, V.S (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp. 253\u2013262. ACM","DOI":"10.1145\/997817.997857"},{"issue":"8","key":"2927_CR8","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TIFS.2017.2692728","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics and Secur 12(8):1874\u20131884","journal-title":"IEEE Trans Inf Forensics and Secur"},{"issue":"3","key":"2927_CR9","first-page":"453","volume":"16","author":"ZJ Fu","year":"2015","unstructured":"Fu ZJ, Shu JG, Wang J, Liu YL, Lee SY (2015) Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. WHWgW 16(3):453\u2013460","journal-title":"WHWgW"},{"key":"2927_CR10","doi-asserted-by":"crossref","unstructured":"He, K, Wen, F, Sun, J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2938\u20132945","DOI":"10.1109\/CVPR.2013.378"},{"key":"2927_CR11","doi-asserted-by":"crossref","unstructured":"Hirata, K, Kato, T (1992) Query by visual example. In: international conference on extending database technology, pp. 56\u201371. Springer","DOI":"10.1007\/BFb0032423"},{"issue":"11","key":"2927_CR12","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593\u20134607","journal-title":"IEEE Trans Image Process"},{"key":"2927_CR13","doi-asserted-by":"crossref","unstructured":"Huang, K, Xu, M, Fu, S, Wang, D (2016) Efficient privacy-preserving content-based image retrieval in the cloud. In: International conference on web-age information management, pp. 28\u201339. Springer","DOI":"10.1007\/978-3-319-39958-4_3"},{"key":"2927_CR14","doi-asserted-by":"crossref","unstructured":"J\u00e9gou, H, Douze, M, Schmid, C (2008) Hamming embedding and weak geometry consistency for large scale image search-extended version","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"2927_CR15","doi-asserted-by":"crossref","unstructured":"Jim\u00e9nez, A, Raj, B, Portelo, J, Trancoso, I (2015) Secure modular hashing. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp. 1\u20136. IEEE","DOI":"10.1109\/WIFS.2015.7368567"},{"key":"2927_CR16","doi-asserted-by":"crossref","unstructured":"Li, J, Li, J, Chen, X, Jia, C, Liu, Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: International conference on network and system security, pp. 490\u2013502. Springer","DOI":"10.1007\/978-3-642-34601-9_37"},{"issue":"3","key":"2927_CR17","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics and Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics and Secur"},{"issue":"15","key":"2927_CR18","first-page":"1","volume":"21","author":"P Li","year":"2016","unstructured":"Li P, Li T, Yao ZA, Tang CM, Li J (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):1\u201311","journal-title":"Soft Comput"},{"issue":"2","key":"2927_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 60(2):91\u2013110","journal-title":"Int J Comput Vision"},{"key":"2927_CR20","doi-asserted-by":"crossref","unstructured":"Lu, W, Swaminathan, A, Varna, A.L, Wu, M (2009) Enabling search over encrypted multimedia databases. In: Proceedings international society for optics and photonics IS&T\/SPIE electronic imaging, pp. 725,418\u2013725,418","DOI":"10.1117\/12.806980"},{"key":"2927_CR21","doi-asserted-by":"crossref","unstructured":"Lu, W, Varna, A.L, Swaminathan, A, Wu, M (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009, pp. 1533\u20131536. IEEE","DOI":"10.1109\/ICASSP.2009.4959888"},{"key":"2927_CR22","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/ACCESS.2014.2371994","volume":"2","author":"W Lu","year":"2014","unstructured":"Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2:125\u2013141","journal-title":"IEEE Access"},{"key":"2927_CR23","doi-asserted-by":"crossref","unstructured":"Shashank, J, Kowshik, P, Srinathan, K, Jawahar, C (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, 2008. CVPR 2008, pp. 1\u20138. IEEE","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"2927_CR24","doi-asserted-by":"crossref","unstructured":"Shen, J, Shen, J, Chen, X, Huang, X, Susilo, W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics and Secur","DOI":"10.1109\/TIFS.2017.2705620"},{"issue":"11","key":"2927_CR25","doi-asserted-by":"publisher","first-page":"4487","DOI":"10.1007\/s00500-015-1758-6","volume":"20","author":"J Wang","year":"2016","unstructured":"Wang J, Miao M, Gao Y, Chen X (2016) Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput 20(11):4487\u20134495","journal-title":"Soft Comput"},{"key":"2927_CR26","doi-asserted-by":"crossref","unstructured":"Wong, W.K, Cheung, D.W.l, Kao, B, Mamoulis, N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139\u2013152. ACM","DOI":"10.1145\/1559845.1559862"},{"issue":"9","key":"2927_CR27","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s00500-013-1202-8","volume":"18","author":"F Xhafa","year":"2014","unstructured":"Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795\u20131802","journal-title":"Soft Comput"},{"issue":"2","key":"2927_CR28","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel and Distrib Syst"},{"issue":"11","key":"2927_CR29","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics and Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics and Secur"},{"key":"2927_CR30","doi-asserted-by":"crossref","unstructured":"Xia, Z, Zhu, Y, Sun, X, Qin, Z, Ren, K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput","DOI":"10.1109\/TIFS.2016.2590944"},{"issue":"2","key":"2927_CR31","first-page":"435","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. WHWgW 18(2):435\u2013442","journal-title":"WHWgW"},{"key":"2927_CR32","doi-asserted-by":"crossref","unstructured":"Yuan, J, Yu, S, Guo, L (2015) Seisa: Secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083\u20132091. IEEE","DOI":"10.1109\/INFOCOM.2015.7218593"},{"key":"2927_CR33","unstructured":"Zhang, L, Jung, T, Feng, P, Li, X.Y, Liu, Y (2014) Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593"},{"key":"2927_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, L, Jung, T, Liu, C, Ding, X, Li, X.Y, Liu, Y (2015) Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th international conference on distributed computing systems (ICDCS), pp. 308\u2013317. IEEE","DOI":"10.1109\/ICDCS.2015.39"},{"key":"2927_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, Y, Zhuo, L, Peng, Y, Zhang, J (2014) A secure image retrieval method based on homomorphic encryption for cloud computing. In: 2014 19th international conference on digital signal processing (DSP), pp. 269\u2013274. IEEE","DOI":"10.1109\/ICDSP.2014.6900669"},{"issue":"1","key":"2927_CR36","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics and Secur 12(1):48\u201363","journal-title":"IEEE Trans Inf Forensics and Secur"},{"key":"2927_CR37","unstructured":"Zou, Q, Wang, J, Ye, J, Shen, J, Chen, X (2016) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput, pp. 1\u201311"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2927-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2927-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2927-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T17:44:32Z","timestamp":1659894272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2927-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,20]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["2927"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2927-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,11,20]]},"assertion":[{"value":"20 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}