{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T23:27:56Z","timestamp":1750980476490,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10998-7","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T11:03:59Z","timestamp":1620644639000},"page":"26889-26910","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Secure content based image retrieval system using deep learning with multi share creation scheme in cloud environment"],"prefix":"10.1007","volume":"80","author":[{"given":"R.","family":"Punithavathi","sequence":"first","affiliation":[]},{"given":"A.","family":"Ramalingam","sequence":"additional","affiliation":[]},{"given":"Chinnarao","family":"Kurangi","sequence":"additional","affiliation":[]},{"given":"A. Siva Krishna","family":"Reddy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3361-7077","authenticated-orcid":false,"given":"J.","family":"Uthayakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"10998_CR1","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security standardisation research. SSR 2014. Lecture notes in computer science, vol 8893. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-14054-4_10","DOI":"10.1007\/978-3-319-14054-4_10"},{"issue":"2","key":"10998_CR2","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.ejbas.2017.02.004","volume":"4","author":"MK Alsmadi","year":"2017","unstructured":"Alsmadi MK (2017) An efficient similarity measure for content based image retrieval using memetic algorithm. Egypt J Basic Appl Sci 4(2):112\u2013122","journal-title":"Egypt J Basic Appl Sci"},{"issue":"3","key":"10998_CR3","first-page":"373","volume":"30","author":"MK Alsmadi","year":"2018","unstructured":"Alsmadi MK (2018) Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm. J King Saud Univ Comput Inf Sci 30(3):373\u2013381","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"10998_CR4","doi-asserted-by":"crossref","unstructured":"Cheng SL, Wang LJ, Huang G, Du AY (2019) A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 25:1\u201323","DOI":"10.1007\/s11042-019-07753-4"},{"issue":"2","key":"10998_CR5","doi-asserted-by":"publisher","first-page":"282","DOI":"10.3390\/sym12020282","volume":"12","author":"A Du","year":"2020","unstructured":"Du A, Wang L, Cheng S, Ao N (2020) A privacy-protected image retrieval scheme for fast and secure image search. Symmetry 12(2):282","journal-title":"Symmetry"},{"issue":"1","key":"10998_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.knosys.2010.06.001","volume":"24","author":"ME ElAlami","year":"2011","unstructured":"ElAlami ME (2011) A novel image retrieval model based on the most relevant features. Knowl Based Syst 24(1):23\u201332","journal-title":"Knowl Based Syst"},{"key":"10998_CR7","doi-asserted-by":"publisher","unstructured":"Elhoseny M, Shankar K, Lakshmanaprabu SK et al (2020) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 32:10979\u201310993. https:\/\/doi.org\/10.1007\/s00521-018-3801-x","DOI":"10.1007\/s00521-018-3801-x"},{"key":"10998_CR8","doi-asserted-by":"crossref","unstructured":"Ferreira B, Rodrigues J, Leitao J, Domingos H (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 7(3):784\u2013798","DOI":"10.1109\/TCC.2017.2669999"},{"issue":"13","key":"10998_CR9","doi-asserted-by":"publisher","first-page":"18503","DOI":"10.1007\/s11042-019-7163-x","volume":"78","author":"P Geetha","year":"2019","unstructured":"Geetha P, Jayanthi VS, Jayanthi AN (2019) Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. Multimed Tools Appl 78(13):18503\u201318530","journal-title":"Multimed Tools Appl"},{"key":"10998_CR10","unstructured":"Gu Q, Xia Z, Sun X, Weng J (2020) MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. arXiv preprint arXiv:2007.12416"},{"key":"10998_CR11","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. IEEE Comput Soc Conf Comput Vis Pattern Recogn :770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"14","key":"10998_CR12","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1016\/j.imavis.2004.03.026","volume":"22","author":"N Jhanwar","year":"2004","unstructured":"Jhanwar N, Chaudhuri S, Seetharaman G, Zavidovique B (2004) Content based image retrieval using motif cooccurrence matrix. Image Vis Comput 22(14):1211\u20131220","journal-title":"Image Vis Comput"},{"key":"10998_CR13","doi-asserted-by":"publisher","first-page":"102959","DOI":"10.1016\/j.autcon.2019.102959","volume":"108","author":"M Kouzehgar","year":"2019","unstructured":"Kouzehgar M, Tamilselvam YK, Heredia MV, Elara MR (2019) Self-reconfigurable fa\u00e7ade-cleaning robot equipped with deep-learning-based crack detection based on convolutional neural networks. Autom Constr 108:102959","journal-title":"Autom Constr"},{"key":"10998_CR14","doi-asserted-by":"crossref","unstructured":"Li M, Zhang M, Wang Q, Chow SS, Du M, Chen Y, Lit C, 2018, April. InstantCryptoGram: Secure image retrieval service. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications (pp. 2222\u20132230). IEEE, New York","DOI":"10.1109\/INFOCOM.2018.8486239"},{"issue":"6","key":"10998_CR15","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.imavis.2008.07.004","volume":"27","author":"CH Lin","year":"2009","unstructured":"Lin CH, Chen RT, Chan YK (2009) A smart content-based image retrieval system based on color and texture feature. Image Vis Comput 27(6):658\u2013665","journal-title":"Image Vis Comput"},{"key":"10998_CR16","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2016.03.033","volume":"79","author":"KV Madhavi","year":"2016","unstructured":"Madhavi KV, Tamilkodi R, Sudha KJ (2016) An innovative method for retrieving relevant images by getting the top-ranked images first using interactive genetic algorithm. Procedia Comput Sci 79:254\u2013261","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"10998_CR17","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/s13640-018-0386-3","volume":"2018","author":"H Pan","year":"2018","unstructured":"Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 2018(1):142","journal-title":"EURASIP J Image Video Process"},{"key":"10998_CR18","doi-asserted-by":"crossref","unstructured":"Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Futur Gener Comput Syst 111:213\u2013225","DOI":"10.1016\/j.future.2020.04.034"},{"key":"10998_CR19","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.compeleceng.2017.08.030","volume":"70","author":"LK Pavithra","year":"2018","unstructured":"Pavithra LK, Sharmila TS (2018) An efficient framework for image retrieval using color, texture and edge features. Comput Electr Eng 70:580\u2013593","journal-title":"Comput Electr Eng"},{"key":"10998_CR20","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.comcom.2018.06.001","volume":"127","author":"N Rahim","year":"2018","unstructured":"Rahim N, Ahmad J, Muhammad K, Sangaiah AK, Baik SW (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75\u201385","journal-title":"Comput Commun"},{"issue":"2","key":"10998_CR21","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/CC.2017.7868160","volume":"14","author":"K Shankar","year":"2017","unstructured":"Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun 14(2):118\u2013130","journal-title":"China Commun"},{"key":"10998_CR22","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2014) Going deeper with convolutions. arXiv 2014. arXiv preprint arXiv:1409.4842, 1409","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"10998_CR23","doi-asserted-by":"crossref","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, Inception-Resnet and the Impact of Residual Connections on Learning, Thirty-First AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"10998_CR24","doi-asserted-by":"crossref","unstructured":"Wang H, Xia Z, Fei J, Xiao F (2020) An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing. IEEE Access 8:61138\u201361147","DOI":"10.1109\/ACCESS.2020.2983194"},{"issue":"11","key":"10998_CR25","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10998_CR26","doi-asserted-by":"publisher","first-page":"30392","DOI":"10.1109\/ACCESS.2018.2845456","volume":"6","author":"Z Xia","year":"2018","unstructured":"Xia Z, Ma X, Shen Z, Sun X, Xiong NN, Jeon B (2018) Secure image LBP feature extraction in cloud-based smart campus. IEEE Access 6:30392\u201330401","journal-title":"IEEE Access"},{"key":"10998_CR27","doi-asserted-by":"publisher","first-page":"160082","DOI":"10.1109\/ACCESS.2019.2951175","volume":"7","author":"Y Xu","year":"2019","unstructured":"Xu Y, Zhao X, Gong J (2019) A large-scale secure image retrieval method in cloud environment. IEEE Access 7:160082\u2013160090","journal-title":"IEEE Access"},{"issue":"5","key":"10998_CR28","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1016\/j.compeleceng.2012.05.010","volume":"38","author":"SM Youssef","year":"2012","unstructured":"Youssef SM (2012) ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval. Comput Electr Eng 38(5):1358\u20131376","journal-title":"Comput Electr Eng"},{"key":"10998_CR29","doi-asserted-by":"crossref","unstructured":"Yuan BH, Liu GH (2020) Image retrieval based on gradient-structures histogram. Neural Comput Appl 32(15):11717\u201311727","DOI":"10.1007\/s00521-019-04657-0"},{"key":"10998_CR30","doi-asserted-by":"crossref","unstructured":"Zhang C, Zhu L, Zhang S, Yu W (2020) TDHPPIR: an efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406:386\u2013398","DOI":"10.1016\/j.neucom.2019.11.119"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10998-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10998-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10998-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T22:03:46Z","timestamp":1672092226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10998-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":30,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10998"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10998-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,5,10]]},"assertion":[{"value":"22 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}