{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:34:12Z","timestamp":1753601652547,"version":"3.37.3"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702560"],"award-info":[{"award-number":["61702560"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11063-021-10537-3","type":"journal-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T18:02:40Z","timestamp":1624039360000},"page":"2783-2801","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["PPIS-JOIN: A Novel Privacy-Preserving Image Similarity Join Method"],"prefix":"10.1007","volume":"54","author":[{"given":"Chengyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fangxin","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4569-1429","authenticated-orcid":false,"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yangding","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"10537_CR1","doi-asserted-by":"crossref","first-page":"105428","DOI":"10.1016\/j.knosys.2019.105428","volume":"193","author":"D Cao","year":"2020","unstructured":"Cao D, Chu J, Zhu N, Nie L (2020) Cross-modal recipe retrieval via parallel- and cross-attention networks learning. Knowl Based Syst 193:105428","journal-title":"Knowl Based Syst"},{"key":"10537_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3956","author":"T Li","year":"2020","unstructured":"Li T, Liu W, Wang T, Zhao M, Li X, Ma M (2020) Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3956","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10537_CR3","doi-asserted-by":"crossref","first-page":"9904","DOI":"10.1109\/JIOT.2020.2988035","volume":"7","author":"M Huang","year":"2020","unstructured":"Huang M, Zhang K, Zeng Z, Wang T, Liu Y (2020) An AUV-assisted data gathering scheme based on clustering and matrix completion for smart ocean. IEEE Internet Things J 7:9904","journal-title":"IEEE Internet Things J"},{"key":"10537_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3942","author":"B Jiang","year":"2020","unstructured":"Jiang B, Huang G, Wang T, Gui J, Zhu X (2020) Trust based energy efficient data collection with unmanned aerial vehicle in edge network. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3942","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10537_CR5","doi-asserted-by":"crossref","unstructured":"Zhang H, Sheng H (2008) A novel image authentication robust to geometric transformations. In: Congress on image and signal processing","DOI":"10.1109\/CISP.2008.422"},{"key":"10537_CR6","doi-asserted-by":"crossref","first-page":"5573","DOI":"10.1007\/s11042-019-08273-x","volume":"79","author":"C Xu","year":"2020","unstructured":"Xu C, Sun J, Ca Wang (2020) A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems. Multimed Tools Appl 79:5573","journal-title":"Multimed Tools Appl"},{"key":"10537_CR7","doi-asserted-by":"crossref","first-page":"107175","DOI":"10.1016\/j.patcog.2019.107175","volume":"105","author":"X Zhu","year":"2020","unstructured":"Zhu X, Zhu Y, Zheng W (2020) Spectral rotation for deep one-step clustering. Pattern Recognit 105:107175","journal-title":"Pattern Recognit"},{"key":"10537_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2020.3009632","author":"H Shen","year":"2020","unstructured":"Shen H, Zhu Y, Zheng W, Zhu X (2020) Half-quadratic minimization for unsupervised feature selection on incomplete data. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/tnnls.2020.3009632","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10537_CR9","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.ins.2019.11.033","volume":"514","author":"D Cao","year":"2020","unstructured":"Cao D, Han N, Wei X, He X (2020) Video-based recipe retrieval. Inf Sci 514:302","journal-title":"Inf Sci"},{"issue":"11","key":"10537_CR10","doi-asserted-by":"crossref","first-page":"2763","DOI":"10.1109\/TIFS.2017.2721221","volume":"12","author":"X Yuan","year":"2017","unstructured":"Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-preserving similarity joins over encrypted data. IEEE Trans Inf Forensics Secur 12(11):2763\u20132775","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10537_CR11","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TNNLS.2020.2979190","volume":"32","author":"L Wu","year":"2020","unstructured":"Wu L, Wang Y, Gao J, Wang M, Zha Z, Tao D (2020) Deep co-attention based comparators for relative representation learning on person re-identification. IEEE Trans Neural Netw Learn Syst 32:722","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10537_CR12","doi-asserted-by":"crossref","first-page":"1412","DOI":"10.1109\/LGRS.2019.2899823","volume":"16","author":"L Fang","year":"2019","unstructured":"Fang L, Liu Z, Song W (2019) Deep hashing neural networks for hyperspectral image feature extraction. IEEE Geosci Remote Sens Lett 16:1412","journal-title":"IEEE Geosci Remote Sens Lett"},{"key":"10537_CR13","first-page":"1072","volume":"22","author":"Y Liu","year":"2013","unstructured":"Liu Y, Xiao Y (2013) A robust image hashing algorithm resistant against geometrical attacks. Radioengineering 22:1072","journal-title":"Radioengineering"},{"issue":"7","key":"10537_CR14","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1109\/TKDE.2016.2530060","volume":"28","author":"C Zhang","year":"2016","unstructured":"Zhang C, Zhang Y, Zhang W, Lin X (2016) Inverted linear quadtree: efficient top k spatial keyword search. IEEE Trans Knowl Data Eng 28(7):1706\u20131721","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10537_CR15","doi-asserted-by":"crossref","unstructured":"Chen L, Shang S, Jensen CS, Yao B, Kalnis P (2020) Parallel semantic trajectory similarity join. In: 2020 IEEE 36th international conference on data engineering (ICDE), IEEE, pp 997\u20131008","DOI":"10.1109\/ICDE48307.2020.00091"},{"key":"10537_CR16","doi-asserted-by":"crossref","first-page":"158389","DOI":"10.1109\/ACCESS.2019.2948388","volume":"7","author":"L Zhu","year":"2019","unstructured":"Zhu L, Yu W, Zhang C, Zhang Z, Huang F, Yu H (2019) SVS-JOIN: efficient spatial visual similarity join for geo-multimedia. IEEE Access 7:158389\u2013158408","journal-title":"IEEE Access"},{"issue":"4","key":"10537_CR17","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TKDE.2017.2651821","volume":"29","author":"N Ta","year":"2017","unstructured":"Ta N, Li G, Xie Y, Li C, Hao S, Feng J (2017) Signature-based trajectory similarity join. IEEE Trans Knowl Data Eng 29(4):870\u2013883","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10537_CR18","doi-asserted-by":"crossref","unstructured":"Christiani T, Pagh R, Sivertsen J (2018) Scalable and robust set similarity join. In: 2018 IEEE 34th international conference on data engineering (ICDE), IEEE, pp 1240\u20131243","DOI":"10.1109\/ICDE.2018.00120"},{"issue":"3","key":"10537_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2000824.2000825","volume":"36","author":"C Xiao","year":"2011","unstructured":"Xiao C, Wang W, Lin X, Yu JX, Wang G (2011) Efficient similarity joins for near-duplicate detection. ACM Trans Database Syst 36(3):1\u201341","journal-title":"ACM Trans Database Syst"},{"issue":"12","key":"10537_CR20","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/TKDE.2016.2601325","volume":"28","author":"Z Shang","year":"2016","unstructured":"Shang Z, Liu Y, Li G, Feng J (2016) K-join: knowledge-aware similarity join. IEEE Trans Knowl Data Eng 28(12):3293\u20133308","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10537_CR21","doi-asserted-by":"crossref","unstructured":"Wang J, Li G, Fe J (2011) Fast-join: an efficient method for fuzzy token matching based string similarity join. In: 2011 IEEE 27th international conference on data engineering, IEEE, pp 458\u2013469","DOI":"10.1109\/ICDE.2011.5767865"},{"key":"10537_CR22","doi-asserted-by":"crossref","unstructured":"Wang J, Li G, Feng J (2012) Can we beat the prefix filtering? An adaptive framework for similarity join and search. In: Proceedings of the 2012 ACM SIGMOD international conference on management of data, pp 85\u201396","DOI":"10.1145\/2213836.2213847"},{"issue":"10","key":"10537_CR23","doi-asserted-by":"crossref","first-page":"2217","DOI":"10.1109\/TKDE.2012.195","volume":"25","author":"C Rong","year":"2012","unstructured":"Rong C, Lu W, Wang X, Du X, Chen Y, Tung AK (2012) Efficient and scalable processing of string similarity join. IEEE Trans Knowl Data Eng 25(10):2217\u20132230","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"10537_CR24","doi-asserted-by":"crossref","first-page":"1710","DOI":"10.1109\/TKDE.2014.2373385","volume":"27","author":"Y Xiong","year":"2014","unstructured":"Xiong Y, Zhu Y, Philip SY (2014) Top-k similarity join in heterogeneous information networks. IEEE Trans Knowl Data Eng 27(6):1710\u20131723","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10537_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2016.10.042","volume":"381","author":"R Li","year":"2017","unstructured":"Li R, Zhao X, Shang H, Chen Y, Xiao W (2017) Fast top-k similarity join for SimRank. Inf Sci 381:1\u201319","journal-title":"Inf Sci"},{"key":"10537_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00500-019-04566-3","volume":"24","author":"H Wang","year":"2020","unstructured":"Wang H, Yang L, Xiao Y (2020) SETJoin: a novel top-k similarity join algorithm. Soft Comput 24:1\u201316","journal-title":"Soft Comput"},{"issue":"3","key":"10537_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3083899","volume":"42","author":"W Zheng","year":"2017","unstructured":"Zheng W, Zou L, Chen L, Zhao D (2017) Efficient simrank-based similarity join. ACM Trans Database Syst 42(3):1\u201337","journal-title":"ACM Trans Database Syst"},{"issue":"2","key":"10537_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3086695","volume":"36","author":"J Zhang","year":"2017","unstructured":"Zhang J, Tang J, Ma C, Tong H, Jing Y, Li J, Moens MF (2017) Fast and flexible top-k similarity search on large networks. ACM Trans Inf Syst 36(2):1\u201330","journal-title":"ACM Trans Inf Syst"},{"key":"10537_CR29","doi-asserted-by":"crossref","first-page":"1412","DOI":"10.1109\/TMM.2018.2877886","volume":"PP","author":"L Wu","year":"2019","unstructured":"Wu L, Wang Y, Gao J, Li X (2019) Where-and-when to look: deep siamese attention networks for video-based person re-identification. IEEE Trans Multimedia PP:1412\u20131424","journal-title":"IEEE Trans Multimedia"},{"key":"10537_CR30","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.patrec.2018.08.010","volume":"130","author":"H Wang","year":"2020","unstructured":"Wang H, Li Z, Li Y, Gupta BB, Choi C (2020) Visual saliency guided complex image retrieval. Pattern Recognit Lett 130:64\u201372","journal-title":"Pattern Recognit Lett"},{"key":"10537_CR31","doi-asserted-by":"crossref","first-page":"21770","DOI":"10.1109\/ACCESS.2020.2968982","volume":"8","author":"L Zhu","year":"2020","unstructured":"Zhu L, Song J, Yu W, Zhang C, Yu H, Zhang Z (2020) Reverse spatial visual Top-$$k$$ query. IEEE Access 8:21770\u201321787","journal-title":"IEEE Access"},{"key":"10537_CR32","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TFUZZ.2020.2984991","volume":"29","author":"H Lu","year":"2020","unstructured":"Lu H, Zhang M, Xu X, Li Y, Shen HT (2020) Deep fuzzy hashing network for efficient image retrieval. IEEE Trans Fuzzy Syst 29:166","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10537_CR33","doi-asserted-by":"crossref","first-page":"4833","DOI":"10.1109\/TNNLS.2017.2777489","volume":"29","author":"Y Wang","year":"2018","unstructured":"Wang Y, Wu L, Lin X, Gao J (2018) Multi-view spectral clustering via structured low-rank matrix factorization. IEEE Trans Neural Netw Learn Syst 29:4833\u20134843","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10537_CR34","doi-asserted-by":"crossref","first-page":"1945","DOI":"10.1007\/s11280-019-00766-x","volume":"23","author":"R Hu","year":"2020","unstructured":"Hu R, Zhu X, Zhu Y, Gan J (2020) Robust SVM with adaptive graph learning. World Wide Web 23:1945","journal-title":"World Wide Web"},{"key":"10537_CR35","unstructured":"Wang Y (2020) Survey on deep multi-modal data analytics: collaboration, rivalry and fusion. arXiv preprint arXiv:2006.08159"},{"issue":"7553","key":"10537_CR36","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"10537_CR37","unstructured":"Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks?. In: Advances in neural information processing systems, pp 3320\u20133328"},{"key":"10537_CR38","doi-asserted-by":"crossref","unstructured":"Wan J, Wang D, Hoi SCH, Wu P, Zhu J, Zhang Y, Li J (2014) Deep learning for content-based image retrieval: a comprehensive study. In: Proceedings of the 22nd ACM international conference on Multimedia, pp 157\u2013166","DOI":"10.1145\/2647868.2654948"},{"key":"10537_CR39","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.neucom.2019.12.094","volume":"387","author":"C Zhang","year":"2020","unstructured":"Zhang C, Zhu L, Zhang S, Yu W (2020) PAC-GAN: an effective pose augmentation scheme for unsupervised cross-view person re-identification. Neurocomputing 387:22\u201339","journal-title":"Neurocomputing"},{"key":"10537_CR40","doi-asserted-by":"crossref","first-page":"180571","DOI":"10.1109\/ACCESS.2019.2940055","volume":"7","author":"L Zhu","year":"2019","unstructured":"Zhu L, Long J, Zhang C, Yu W, Yuan X, Sun L (2019) An efficient approach for geo-multimedia cross-modal retrieval. IEEE Access 7:180571\u2013180589","journal-title":"IEEE Access"},{"issue":"11","key":"10537_CR41","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"10537_CR42","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"10537_CR43","doi-asserted-by":"crossref","unstructured":"Gordo A, Almaz\u00e1n J, Revaud J, Larlus D (2016) Deep image retrieval: learning global representations for image search. In: European conference on computer vision, Springer, Cham, pp 241\u2013257","DOI":"10.1007\/978-3-319-46466-4_15"},{"issue":"12","key":"10537_CR44","doi-asserted-by":"crossref","first-page":"5706","DOI":"10.1109\/TIP.2017.2736343","volume":"26","author":"P Liu","year":"2017","unstructured":"Liu P, Guo JM, Wu CY, Cai D (2017) Fusion of deep learning and compressed domain features for content-based image retrieval. IEEE Trans Image Process 26(12):5706\u20135717","journal-title":"IEEE Trans Image Process"},{"key":"10537_CR45","doi-asserted-by":"crossref","unstructured":"Seddati O, Dupont S, Mahmoudi S, Parian M (2017) Towards good practices for image retrieval based on CNN features. In: Proceedings of the IEEE international conference on computer vision workshops, pp 1246\u20131255","DOI":"10.1109\/ICCVW.2017.150"},{"issue":"11","key":"10537_CR46","doi-asserted-by":"crossref","first-page":"5288","DOI":"10.1109\/TIP.2018.2845136","volume":"27","author":"J Yang","year":"2018","unstructured":"Yang J, Liang J, Shen H, Wang K, Rosin PL, Yang MH (2018) Dynamic match kernel with deep convolutional features for image retrieval. IEEE Trans Image Process 27(11):5288\u20135302","journal-title":"IEEE Trans Image Process"},{"key":"10537_CR47","doi-asserted-by":"crossref","unstructured":"Zhou Z, Zheng Y, Ye H, Pu J, Sun G (2018) Satellite image scene classification via ConvNet with context aggregation. In: Pacific rim conference on multimedia, Springer, Cham, pp 329\u2013339","DOI":"10.1007\/978-3-030-00767-6_31"},{"issue":"7","key":"10537_CR48","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/TPAMI.2018.2846566","volume":"41","author":"F Radenovi\u0107","year":"2018","unstructured":"Radenovi\u0107 F, Tolias G, Chum O (2018) Fine-tuning CNN image retrieval with no human annotation. IEEE Trans Pattern Anal Mach Intell 41(7):1655\u20131668","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10537_CR49","doi-asserted-by":"crossref","unstructured":"Bhattarai M, Oyen D, Castorena J, Yang L, Wohlberg B (2020) Diagram image retrieval using sketch-based deep learning and transfer learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp 174\u2013175","DOI":"10.1109\/CVPRW50498.2020.00095"},{"key":"10537_CR50","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.patrec.2019.11.011","volume":"129","author":"A Mukherjee","year":"2020","unstructured":"Mukherjee A, Sil J, Sahu A, Chowdhury AS (2020) A bag of constrained informative deep visual words for image retrieval. Pattern Recognit Lett 129:158\u2013165","journal-title":"Pattern Recognit Lett"},{"key":"10537_CR51","doi-asserted-by":"crossref","first-page":"107148","DOI":"10.1016\/j.patcog.2019.107148","volume":"100","author":"Y Wang","year":"2020","unstructured":"Wang Y, Huang F, Zhang Y, Feng R, Zhang T, Fan W (2020) Deep cascaded cross-modal correlation learning for fine-grained sketch-based image retrieval. Pattern Recognit 100:107148","journal-title":"Pattern Recognit"},{"key":"10537_CR52","unstructured":"Luo X, Chen C, Zhong H, Zhang H, Deng M, Huang J, Hua X (2020) A survey on deep hashing methods. arXiv preprint arXiv:2003.03369"},{"issue":"1","key":"10537_CR53","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/JPROC.2015.2487976","volume":"104","author":"J Wang","year":"2016","unstructured":"Wang J, Liu W, Kumar S, Chang SF (2016) Learning to hash for indexing big data\u2014a survey. Proc IEEE 104(1):34\u201357","journal-title":"Proc IEEE"},{"key":"10537_CR54","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1007\/s11042-015-3225-x","volume":"76","author":"J Ouyang","year":"2019","unstructured":"Ouyang J, Liu Y, Shu H (2019) Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimed Tools Appl 76:2609","journal-title":"Multimed Tools Appl"},{"key":"10537_CR55","doi-asserted-by":"crossref","first-page":"556","DOI":"10.13164\/re.2016.0556","volume":"25","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xin G, Yong X (2016) Robust image hashing using radon transform and invariant features. Radioengineering 25:556\u2013564","journal-title":"Radioengineering"},{"key":"10537_CR56","first-page":"1","volume":"17","author":"Y Wang","year":"2020","unstructured":"Wang Y (2020) Survey on deep multi-modal data analytics: collaboration, rivalry, and fusion. ACM Trans Multimed Comput Commun Appl 17:1\u201325","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"5","key":"10537_CR57","doi-asserted-by":"crossref","first-page":"2352","DOI":"10.1109\/TIP.2017.2678163","volume":"26","author":"J Lu","year":"2017","unstructured":"Lu J, Liong VE, Zhou J (2017) Deep hashing for scalable image search. IEEE Trans Image Process 26(5):2352\u20132367","journal-title":"IEEE Trans Image Process"},{"key":"10537_CR58","doi-asserted-by":"crossref","unstructured":"Yang HF, Tu CH, Chen CS (2019) Adaptive labeling for deep learning to hash. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00088"},{"key":"10537_CR59","doi-asserted-by":"crossref","unstructured":"Eghbali S, Tahvildari L (2019) Deep spherical quantization for image search. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 11690\u201311699","DOI":"10.1109\/CVPR.2019.01196"},{"key":"10537_CR60","doi-asserted-by":"crossref","unstructured":"Ghasedi Dizaji K, Zheng F, Sadoughi N, Yang Y, Deng C, Huang H (2018) Unsupervised deep generative adversarial hashing network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3664\u20133673","DOI":"10.1109\/CVPR.2018.00386"},{"key":"10537_CR61","doi-asserted-by":"crossref","unstructured":"Xu J, Guo C, Liu Q, Qin J, Wang Y, Liu L (2019) DHA: Supervised deep learning to hash with an adaptive loss function. In: Proceedings of the IEEE international conference on computer vision workshops","DOI":"10.1109\/ICCVW.2019.00368"},{"key":"10537_CR62","doi-asserted-by":"crossref","unstructured":"Gattupalli V, Zhuo Y, Li B (2019) Weakly supervised deep image hashing through tag embeddings. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 10375\u201310384","DOI":"10.1109\/CVPR.2019.01062"},{"key":"10537_CR63","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.1109\/TMM.2019.2951462","volume":"22","author":"Y Peng","year":"2019","unstructured":"Peng Y, Zhang J, Ye Z (2019) Deep reinforcement learning for image hashing. IEEE Trans Multimed 22:2061","journal-title":"IEEE Trans Multimed"},{"key":"10537_CR64","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1109\/TIP.2019.2940693","volume":"29","author":"H Cui","year":"2019","unstructured":"Cui H, Zhu L, Li J, Yang Y, Nie L (2019) Scalable deep hashing for large-scale social image retrieval. IEEE Trans Image Process 29:1271\u20131284","journal-title":"IEEE Trans Image Process"},{"key":"10537_CR65","doi-asserted-by":"crossref","unstructured":"Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: 2008 IEEE conference on computer vision and pattern recognition, IEEE, pp 1\u20138","DOI":"10.1109\/CVPR.2008.4587388"},{"key":"10537_CR66","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.neucom.2019.11.119","volume":"406","author":"C Zhang","year":"2020","unstructured":"Zhang C, Zhu L, Zhang S, Yu W (2020) TDHPPIR: an efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406:386","journal-title":"Neurocomputing"},{"key":"10537_CR67","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), IEEE, pp 19\u201338","DOI":"10.1109\/SP.2017.12"},{"issue":"5","key":"10537_CR68","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono Y, Hayashi T, Wang L, Moriai S (2017) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333\u20131345","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10537_CR69","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MNET.001.1800503","volume":"33","author":"M Shen","year":"2019","unstructured":"Shen M, Deng Y, Zhu L, Du X, Guizani N (2019) Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach. IEEE Netw 33(5):27\u201333","journal-title":"IEEE Netw"},{"key":"10537_CR70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11071-020-05520-x","volume":"100","author":"L Yu","year":"2020","unstructured":"Yu L, Zheng Q, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map. Nonlinear Dyn 100:1\u201315","journal-title":"Nonlinear Dyn"},{"key":"10537_CR71","doi-asserted-by":"crossref","unstructured":"Lu W, Varna AL, Swaminathan A, Wu M (2009) Secure image retrieval through feature protection. In: 2009 IEEE international conference on acoustics, speech and signal processing, IEEE, pp 1533\u20131536","DOI":"10.1109\/ICASSP.2009.4959888"},{"issue":"1","key":"10537_CR72","first-page":"2249","volume":"3","author":"AI Abdulsada","year":"2013","unstructured":"Abdulsada AI, Ali ANM, Abduljabbar ZA, Hashim HS (2013) Secure image retrieval over untrusted cloud servers. Int J Eng Adv Technol 3(1):2249","journal-title":"Int J Eng Adv Technol"},{"key":"10537_CR73","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TCC.2017.2669999","volume":"7","author":"B Ferreira","year":"2017","unstructured":"Ferreira B, Rodrigues J, Leitao J, Domingos H (2017) Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput 7:784","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"10537_CR74","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/TIFS.2014.2365998","volume":"10","author":"L Weng","year":"2014","unstructured":"Weng L, Amsaleg L, Morton A, Marchand-Maillet S (2014) A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans Inf Forensics Secur 10(1):152\u2013167","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"10537_CR75","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10537_CR76","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.jvcir.2017.01.006","volume":"43","author":"Y Xu","year":"2017","unstructured":"Xu Y, Gong J, Xiong L, Xu Z, Wang J, Shi YQ (2017) A privacy-preserving content-based image retrieval method in cloud environment. J Vis Commun Image Represent 43:164\u2013172","journal-title":"J Vis Commun Image Represent"},{"key":"10537_CR77","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.future.2018.04.089","volume":"109","author":"M Shen","year":"2020","unstructured":"Shen M, Cheng G, Zhu L, Du X, Hu J (2020) Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener Comput Syst 109:621\u2013632","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR78","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.comcom.2018.06.001","volume":"127","author":"N Rahim","year":"2018","unstructured":"Rahim N, Ahmad J, Muhammad K, Sangaiah AK, Baik SW (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75\u201385","journal-title":"Comput Commun"},{"key":"10537_CR79","doi-asserted-by":"crossref","unstructured":"Razeghi B, Voloshynovskiy S (2018) Privacy-preserving outsourced media search using secure sparse ternary codes. In: 2018 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 1992\u20131996","DOI":"10.1109\/ICASSP.2018.8461862"},{"key":"10537_CR80","doi-asserted-by":"crossref","unstructured":"Dusmanu M, Sch\u00f6nberger JL, Sinha SN, Pollefeys M (2020) Privacy-preserving visual feature descriptors through adversarial affine subspace embedding. arXiv preprint arXiv:2006.06634","DOI":"10.1109\/CVPR46437.2021.01404"},{"issue":"5","key":"10537_CR81","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895\u2013934","journal-title":"J Comput Secur"},{"key":"10537_CR82","unstructured":"Krizhevsky A, Hinton G (2009) Learning multiple layers of features from tiny images"},{"key":"10537_CR83","doi-asserted-by":"crossref","unstructured":"Chua TS, Tang J, Hong R, Li H, Luo Z, Zheng Y (2009) NUS-WIDE: a real-world web image database from National University of Singapore. In: Proceedings of the ACM international conference on image and video retrieval, pp 1\u20139","DOI":"10.1145\/1646396.1646452"},{"key":"10537_CR84","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Zitnick CL (2014) Microsoft coco: common objects in context. In: European conference on computer vision, Springer, Cham, pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"10537_CR85","unstructured":"Weiss Y, Torralba A, Fergus R (2009) Spectral hashing. In: Advances in neural information processing systems, pp 1753\u20131760"},{"key":"10537_CR86","doi-asserted-by":"crossref","unstructured":"He K, Wen F, Sun J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2938\u20132945","DOI":"10.1109\/CVPR.2013.378"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-021-10537-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-021-10537-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-021-10537-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T17:25:53Z","timestamp":1660238753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-021-10537-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":86,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10537"],"URL":"https:\/\/doi.org\/10.1007\/s11063-021-10537-3","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"type":"print","value":"1370-4621"},{"type":"electronic","value":"1573-773X"}],"subject":[],"published":{"date-parts":[[2021,6,18]]},"assertion":[{"value":"18 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}