{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:40:16Z","timestamp":1761597616868,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2015,6,30]],"date-time":"2015-06-30T00:00:00Z","timestamp":1435622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-015-2741-z","type":"journal-article","created":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T04:50:14Z","timestamp":1435553414000},"page":"13791-13803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["AC-coefficient histogram-based retrieval for encrypted JPEG images"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2443-2820","authenticated-orcid":false,"given":"Hang","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,30]]},"reference":[{"key":"2741_CR1","first-page":"506","volume":"2004","author":"D Boneh","year":"2004","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R et al (2004) Public-key encryption with keyword search. Adv Cryptol-Eurocrypt 2004:506\u2013522","journal-title":"Adv Cryptol-Eurocrypt"},{"key":"2741_CR2","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M et al (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib Syst IEEE Trans 25:222\u2013233","journal-title":"Parallel Distrib Syst IEEE Trans"},{"key":"2741_CR3","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S et al (2006) Searchable symmetric encryption: improved definitions and efficient constructions. Proceedings of the 13th ACM conference on Computer and Communications Security, 79\u201388","DOI":"10.1145\/1180405.1180417"},{"key":"2741_CR4","doi-asserted-by":"crossref","unstructured":"Erkin Z, Franz M, Guajardo J et al (2009) Privacy-preserving face recognition. Privacy Enhancing Technologies, 235\u2013253","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"2741_CR5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2012.2229783","volume":"30","author":"G Fanti","year":"2013","unstructured":"Fanti G, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30:53\u201361","journal-title":"IEEE Signal Process Mag"},{"key":"2741_CR6","unstructured":"Goh EJ (2003) Secure indexes. IACR Cryptology ePrint Archive, 216"},{"key":"2741_CR7","unstructured":"Int. Telecommunication Union, CCITT Recommendation T.81, Information Technology-Digital Compression and Coding of Continuous-tone Still Images-Requirements and Guidelines 1992"},{"key":"2741_CR8","doi-asserted-by":"crossref","unstructured":"Kamara S, Papamanthou C (2013) Parallel and dynamic searchable symmetric encryption. Financial Cryptography and Data Security, 258\u2013274","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"2741_CR9","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C et al (2010) Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of INFOCOM 2010, 1\u20135","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"2741_CR10","doi-asserted-by":"crossref","unstructured":"Lu W, Swaminathan A, Varna AL et al (2009) Enabling Search over Encrypted Multimedia Databases. IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, 725418\u2013725418","DOI":"10.1117\/12.806980"},{"key":"2741_CR11","doi-asserted-by":"crossref","unstructured":"Lu W, Varna AL, Swaminathan A et al (2009) Secure Image Retrieval through Feature Protection. Proc. of the 2009 I.E. International Conference on Acoustics, Speech and Signal Processing, 1533\u20131536","DOI":"10.1109\/ICASSP.2009.4959888"},{"key":"2741_CR12","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ACCESS.2014.2307057","volume":"2","author":"W Lu","year":"2014","unstructured":"Lu W, Varna A, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. Access IEEE 2:125\u2013141","journal-title":"Access IEEE"},{"key":"2741_CR13","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jvcir.2014.10.008","volume":"26","author":"Z Qian","year":"2015","unstructured":"Qian Z, Zhang X, Ren Y (2015) JPEG encryption for image rescaling in the encrypted domain. J Vis Commun Image Represent 26:9\u201313","journal-title":"J Vis Commun Image Represent"},{"key":"2741_CR14","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimedia 16:1486\u20131491","journal-title":"IEEE Trans Multimedia"},{"key":"2741_CR15","unstructured":"Ra M R, Govindan R, and Ortega A (2013) P3: Toward privacy-preserving photo sharing. NSDI. 515\u2013528"},{"key":"2741_CR16","doi-asserted-by":"crossref","unstructured":"Shashank J, Kowshik P, Srinathan K et al (2008) Private content based image retrieval. Computer Vision and Pattern Recognition, 2008, CVPR 2008, IEEE conference on, 1\u20138","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"2741_CR17","doi-asserted-by":"crossref","unstructured":"Shi E, Bethencourt J, Chan TH et al (2007) Multi-dimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, 2007 (SP\u201907), 350\u2013364","DOI":"10.1109\/SP.2007.29"},{"key":"2741_CR18","unstructured":"Song D X, Wagner D, and Perrig A (2000) Practical techniques for searches in encrypted data. IEEE Symposium on Research in Security and Privacy, 44\u201355"},{"key":"2741_CR19","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/TCE.2005.1561845","volume":"51","author":"S Sudharsanan","year":"2005","unstructured":"Sudharsanan S (2005) Shared key encryption of JPEG color images. Consum Electron IEEE Trans 51:1204\u20131211","journal-title":"Consum Electron IEEE Trans"},{"key":"2741_CR20","doi-asserted-by":"crossref","unstructured":"Wang C, Cao N, Li J et al (2010) Secure ranked keyword search over encrypted cloud data. In IEEE 30th International Conference on Distributed Computing Systems, 253\u2013262","DOI":"10.1109\/ICDCS.2010.34"},{"key":"2741_CR21","doi-asserted-by":"crossref","unstructured":"Wang C, Ren K, Yu S, et al (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM, 2012 Proceedings IEEE, 451\u2013459","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"2741_CR22","doi-asserted-by":"crossref","unstructured":"Zhang X and Cheng H (2014) Histogram-based retrieval for encrypted JPEG images. Signal and Information Processing (ChinaSIP), 2014 I.E. China Summit & International Conference on, 446\u2013449","DOI":"10.1109\/ChinaSIP.2014.6889282"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2741-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2741-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2741-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2741-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T15:59:42Z","timestamp":1566921582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2741-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,30]]},"references-count":22,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["2741"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2741-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2015,6,30]]}}}