{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:26:11Z","timestamp":1758893171776,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T00:00:00Z","timestamp":1550620800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772047","61772513"],"award-info":[{"award-number":["61772047","61772513"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Funds of CETC Big Data Research Institute Co.,Ltd.,","award":["W-2018022"],"award-info":[{"award-number":["W-2018022"]}]},{"name":"The Science and Technology Project of the State Archives Administrator","award":["2015-B-10"],"award-info":[{"award-number":["2015-B-10"]}]},{"name":"The Fundamental Research Funds for the Central Universities","award":["328201803"],"award-info":[{"award-number":["328201803"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00500-019-03834-6","type":"journal-article","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T23:08:58Z","timestamp":1550617738000},"page":"12813-12820","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure face retrieval for group mobile users"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3873-1653","authenticated-orcid":false,"given":"Xin","family":"Jin","sequence":"first","affiliation":[]},{"given":"Yujie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shiming","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Chenggen","family":"Song","sequence":"additional","affiliation":[]},{"given":"Le","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xinghui","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"3834_CR1","doi-asserted-by":"crossref","unstructured":"Avidan S, Butman M (2006) Blind vision. In: Computer vision-ECCV, 9th European conference on computer vision, Graz, Austria, 7\u201313 May 2006, Proceedings, Part III, pp 1\u201313","DOI":"10.1007\/11744078_1"},{"key":"3834_CR2","doi-asserted-by":"crossref","unstructured":"Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. In: 22nd annual network and distributed system security symposium, NDSS, San Diego, California, USA, 8\u201311 Feb 2014","DOI":"10.14722\/ndss.2015.23241"},{"key":"3834_CR3","doi-asserted-by":"crossref","unstructured":"Chu C, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the ACM international conference on multimedia, MM\u201914, Orlando, FL, USA, 3\u20137 Nov 2014, pp 837\u2013840","DOI":"10.1145\/2647868.2655010"},{"key":"3834_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer, Berlin"},{"issue":"2","key":"3834_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2012.2229783","volume":"30","author":"GC Fanti","year":"2013","unstructured":"Fanti GC, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30(2):53\u201361","journal-title":"IEEE Signal Process Mag"},{"key":"3834_CR6","doi-asserted-by":"crossref","unstructured":"Jin X, Chen Y, Ge S, Zhang K, Li X, Li Y, Liu Y, Guo K, Tian Y, Zhao G, Zhang X, Wang Z (2015) Applications and techniques in information security: 6th international conference, ATIS, Beijing, China, 4\u20136 Nov 2015, Proceedings, chap. color image encryption in CIE L*a*b* Space, pp 74\u201385. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-662-48683-2_8"},{"key":"3834_CR7","doi-asserted-by":"crossref","unstructured":"Jin X, Guo K, Song C, Li X, Zhao G, Luo J, Li Y, Chen Y, Liu Y, Wang H (2016a) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Multimedia modeling: 22nd international conference, MMM, Miami, FL, USA, 4\u20136 Jan 2016, Proceedings, Part I, pp 562\u2013573","DOI":"10.1007\/978-3-319-27671-7_47"},{"key":"3834_CR8","doi-asserted-by":"crossref","unstructured":"Jin X, Wu Y, Li X, Li Y, Zhao G, Guo K (2016b) Ppvibe: privacy preserving background extractor via secret sharing in multiple cloud servers. In: 8th international conference on wireless communications & signal processing, WCSP, Yangzhou, China, 13\u201315 Oct 2016, pp\u00a01\u20135","DOI":"10.1109\/WCSP.2016.7752569"},{"key":"3834_CR9","doi-asserted-by":"crossref","unstructured":"Jin X, Yuan P, Li X, Song C, Ge S, Zhao G, Chen Y (2017a) Efficient privacy preserving Viola\u2013Jones type object detection via random base image representation. In: Proceedings of IEEE international conference on multimedia and expo (ICME), Hong Kong, China, 10\u201314 July 2017","DOI":"10.1109\/ICME.2017.8019497"},{"key":"3834_CR10","doi-asserted-by":"crossref","unstructured":"Jin X, Zhu S, Xiao C, Sun H, Li X, Zhao G, Ge S (2017b) 3D textured model encryption via 3D lu chaotic mapping. Sci China Inf Sci 60(12):122107:1-9","DOI":"10.1007\/s11432-017-9266-1"},{"issue":"4","key":"3834_CR11","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/JIOT.2017.2737479","volume":"5","author":"H Lu","year":"2017","unstructured":"Lu H, Li Y, Mu S et al (2017a) Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J 5(4):2315\u20132322","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3834_CR12","doi-asserted-by":"publisher","first-page":"e3927","DOI":"10.1002\/cpe.3927","volume":"29","author":"H Lu","year":"2017","unstructured":"Lu H, Li B, Zhu J et al (2017b) Wound intensity correction and segmentation with convolutional neural networks. Concurr Comput Pract Exp 29(6):e3927","journal-title":"Concurr Comput Pract Exp"},{"issue":"2","key":"3834_CR13","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s11036-017-0932-8","volume":"23","author":"H Lu","year":"2018","unstructured":"Lu H, Li Y, Chen M, Kim H, Serikawa S (2018a) Brain intelligence: go beyond artificial intelligence. Mob Netw Appl 23(2):368\u2013375. \n                    https:\/\/doi.org\/10.1007\/s11036-017-0932-8","journal-title":"Mob Netw Appl"},{"key":"3834_CR14","doi-asserted-by":"crossref","unstructured":"Lu H, Li Y, Uemura T et al (2018b) Low illumination underwater light field images reconstruction using deep convolutional neural networks. Future Gener Comput Syst","DOI":"10.1016\/j.future.2018.01.001"},{"key":"3834_CR15","doi-asserted-by":"crossref","unstructured":"Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi-a system for secure face identification. In: 31st IEEE symposium on security and privacy, S&P, 16\u201319 May 2010. Berkeley\/Oakland, California, USA, pp 239\u2013254","DOI":"10.1109\/SP.2010.39"},{"key":"3834_CR16","doi-asserted-by":"crossref","unstructured":"Shashank J, Kowshik P, Srinathan K, Jawahar CV, (2008) Private content based image retrieval. In, (2008) IEEE computer society conference on computer vision and pattern recognition (CVPR),24\u201326 June 2008. Anchorage, Alaska, USA","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"3834_CR17","doi-asserted-by":"crossref","unstructured":"Sohn H, Plataniotis KN, Ro YM (2010) Privacy-preserving watch list screening in video surveillance system. In: Advances in multimedia information processing-PCM, 11th Pacific rim conference on multimedia, Shanghai, China, 21\u201324 Sept 2010, Proceedings, Part I, pp 622\u2013632","DOI":"10.1007\/978-3-642-15702-8_57"},{"key":"3834_CR18","doi-asserted-by":"crossref","unstructured":"Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: IEEE 12th international conference on computer vision, ICCV, Kyoto, Japan, 27 Sept\u20134 Oct 2009, pp 1639\u20131646","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"3834_CR19","unstructured":"Viola PA, Jones MJ (2001) Robust real-time face detection. In: IEEE 8th international conference on computer vision ICCV, Vancouver, British Columbia, Canada, 7\u201314 July 2001, p\u00a0747"},{"issue":"2","key":"3834_CR20","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"PA Viola","year":"2004","unstructured":"Viola PA, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137\u2013154","journal-title":"Int J Comput Vis"},{"key":"3834_CR21","doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, p 139152, ACM, New York, NY, USA","DOI":"10.1145\/1559845.1559862"},{"issue":"2","key":"3834_CR22","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Anal Mach Intell 31(2):210\u2013227","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"3834_CR23","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1016\/j.patcog.2013.11.018","volume":"47","author":"Z Xiaobin","year":"2014","unstructured":"Xiaobin Z, Jing L, Jinqiao W, Changsheng L, Hanqing L (2014) Sparse representation for robust abnormality detection in crowded scenes. Pattern Recognit 47(5):1791\u20131799","journal-title":"Pattern Recognit"},{"key":"3834_CR24","doi-asserted-by":"crossref","unstructured":"Zhu X, Jin X, Zhang X, Li C, He F, Wang L (2015) Context-aware local abnormality detection in crowded scene. Sci China Inf Sci 58(5):052110:111 (CCF-B)","DOI":"10.1007\/s11432-015-5294-x"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03834-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03834-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03834-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T19:15:57Z","timestamp":1582139757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03834-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,20]]},"references-count":24,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["3834"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03834-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2019,2,20]]},"assertion":[{"value":"20 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"None of the authors declare that he\/she has conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animals rights"}}]}}