{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:06:45Z","timestamp":1760710005107,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772561"],"award-info":[{"award-number":["61772561"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00909-3","type":"journal-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T15:03:21Z","timestamp":1568646201000},"page":"161-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7549-7731","authenticated-orcid":false,"given":"Jiaohua","family":"Qin","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xuyu","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"issue":"7","key":"909_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/CC.2016.7559080","volume":"13","author":"ZH Xia","year":"2016","unstructured":"Xia, Z.H., Zhang, L.G., Liu, D.D.: Attribute-based access control scheme with efficient revocation in cloud computing. China Commun. 13(7), 92\u201399 (2016)","journal-title":"China Commun."},{"issue":"7","key":"909_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18072037","volume":"18","author":"LY Qi","year":"2018","unstructured":"Qi, L.Y., Meng, S.M., Zhang, X.Y., Wang, R.L., Xu, X.L., Zhou, Z.L., Dou, W.H.: An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7), 1\u201311 (2018)","journal-title":"Sensors"},{"key":"909_CR3","first-page":"4358536","volume":"2017","author":"LY Qi","year":"2017","unstructured":"Qi, L.Y., Yu, J.G., Zhou, Z.L.: An invocation cost optimization method for web services in cloud environment. Sci. Program. 2017, 4358536\u20134358544 (2017)","journal-title":"Sci. Program."},{"issue":"1","key":"909_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-014-0008-2","volume":"3","author":"ZH Xia","year":"2014","unstructured":"Xia, Z.H., Zhu, Y., Sun, X.M., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3(1), 1\u201311 (2014)","journal-title":"J. Cloud Comput."},{"issue":"12","key":"909_CR5","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., Sun, X.M., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"909_CR6","doi-asserted-by":"crossref","unstructured":"Lu, W., Varna, A. L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: Proceedings of IEEE international conference on acoustics, speech and signal processing, pp. 1533\u20131536 (2009)","DOI":"10.1109\/ICASSP.2009.4959888"},{"issue":"11","key":"909_CR7","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"CY Hsu","year":"2012","unstructured":"Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21(11), 4593\u20134607 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"909_CR8","doi-asserted-by":"crossref","unstructured":"Bai, Y., Zhuo, L., Cheng, B., Peng, Y. F.: Surf feature Extraction in encrypted domain. In: 2014 IEEE international conference on multimedia and expo, pp. 1\u20136 (2014)","DOI":"10.1109\/ICME.2014.6890170"},{"issue":"1","key":"909_CR9","first-page":"125","volume":"2","author":"W Lu","year":"2014","unstructured":"Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access. 2(1), 125\u2013141 (2014)","journal-title":"IEEE Access."},{"issue":"1","key":"909_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-015-0028-6","volume":"2016","author":"H Cheng","year":"2016","unstructured":"Cheng, H., Zhang, X., Yu, J., Li, F.: Markov process-based retrieval for encrypted jpeg images. Eurasip J. Inf. Security. 2016(1), 1\u20139 (2016)","journal-title":"Eurasip J. Inf. Security."},{"issue":"1","key":"909_CR11","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TCC.2015.2491933","volume":"6","author":"ZH Xia","year":"2018","unstructured":"Xia, Z.H., Zhu, Y., Sun, X.M., Qin, Z., Ren, K.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 6(1), 276\u2013286 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"909_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2016.12.030","volume":"387","author":"ZH Xia","year":"2017","unstructured":"Xia, Z.H., Xiong, N., Vasilakos, V., Sun, X.M.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195\u2013204 (2017)","journal-title":"Inf. Sci."},{"issue":"1","key":"909_CR13","first-page":"24626","volume":"7","author":"JH Qin","year":"2018","unstructured":"Qin, J.H., Li, H., Xiang, X.Y., Tan, Y., Pan, W.Y., Xiong, N.N.: An encrypted image retrieval method based on Harris Corner optimization and LSH in cloud computing. IEEE Access. 7(1), 24626\u201324633 (2018)","journal-title":"IEEE Access."},{"key":"909_CR14","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"LY Qi","year":"2018","unstructured":"Qi, L.Y., Zhang, X.Y., Dou, W.C., Hu, C.H., Yang, C., Chen, Jinjun: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in Cross-platform edge environment. Future Gener. Comput. Syst. 88, 636\u2013643 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"909_CR15","first-page":"3437854","volume":"2017","author":"YW Xu","year":"2017","unstructured":"Xu, Y.W., Qi, L.Y., Dou, W.C., Yu, J.G.: Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment. Complexity 2017, 3437854\u20133437862 (2017)","journal-title":"Complexity"},{"issue":"3","key":"909_CR16","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11063-018-9892-7","volume":"49","author":"LY Xiang","year":"2019","unstructured":"Xiang, L.Y., Shen, X.B., Qin, J.H., Hao, W.: Discrete multi-graph hashing for large-scale visual search. Neural Process. Lett. 49(3), 1055\u20131069 (2019)","journal-title":"Neural Process. Lett."},{"issue":"1","key":"909_CR17","doi-asserted-by":"publisher","first-page":"66963","DOI":"10.1109\/ACCESS.2018.2878147","volume":"6","author":"H Li","year":"2018","unstructured":"Li, H., Qin, J.H., Xiang, X.Y., Pan, L.L., Ma, W.T., Xiong, N.N.: An efficient image matching algorithm based on adaptive threshold and RANSAC. IEEE Access. 6(1), 66963\u201366971 (2018)","journal-title":"IEEE Access."},{"issue":"6","key":"909_CR18","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TNNLS.2013.2287275","volume":"25","author":"XW Liu","year":"2014","unstructured":"Liu, X.W., Wang, L., Zhang, J., Yin, J.P., Liu, H.: Global and local structure preservation for feature selection. IEEE Trans. Neural Netw. Learn. Syst. 25(6), 1083\u20131095 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"3","key":"909_CR19","doi-asserted-by":"publisher","first-page":"665","DOI":"10.32604\/cmc.2019.05683","volume":"58","author":"WT Ma","year":"2019","unstructured":"Ma, W.T., Qin, J.H., Xiang, X.Y., Tan, Y., Luo, Y.J., Xiong, N.N.: Adaptive median filtering algorithm based on divide and conquer and its application in CAPTCHA recognition. Comput. Mater. Continua. 58(3), 665\u2013677 (2019)","journal-title":"Comput. Mater. Continua."},{"key":"909_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.inffus.2016.12.007","volume":"36","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Blasch, E., John, V.: Statistical comparison of image fusion algorithms: recommendations. Inf. Fusion. 36, 251\u2013260 (2017)","journal-title":"Inf. Fusion."},{"issue":"4","key":"909_CR21","first-page":"609","volume":"20","author":"B Xie","year":"2018","unstructured":"Xie, B., Qin, J.H., Xiang, X.Y., Li, H., Pan, L.L.: An image retrieval algorithm based on GIST and SIFT features. Int. J. Netw. Secur. 20(4), 609\u2013616 (2018)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"909_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.27.1.013017","volume":"18","author":"JH Qin","year":"2018","unstructured":"Qin, J.H., Sun, X.M., Xiang, X.Y., Niu, C.M.: Principal feature selection and fusion method for image steganalysis. J. Electron. Imaging. 18(3), 1\u201314 (2009)","journal-title":"J. Electron. Imaging."},{"key":"909_CR23","doi-asserted-by":"crossref","unstructured":"Yu, S., Niu, D., Zhao, X., Liu, M.: Color image retrieval based on the hypergraph and the fusion of two descriptors. In: Proceedings of the 10th international congress on image and signal processing, BioMedical engineering and informatics, pp. 1\u20136 (2017)","DOI":"10.1109\/CISP-BMEI.2017.8301985"},{"key":"909_CR24","doi-asserted-by":"crossref","unstructured":"Zheng, L., Wang, S., Tian, L., He, F., Liu, Z., Tian, Q.: Query-adaptive late fusion for image search and person re-identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1741\u20131750 (2015)","DOI":"10.1109\/CVPR.2015.7298783"},{"key":"909_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, X., Jing, X.Y., Wu, F., Wang, Y., Zuo, W., Zheng, W.S.: Learning heterogeneous dictionary pair with feature projection matrix for pedestrian video retrieval via single query image. In: Proceedings of the thirty-first AAAI conference on artificial intelligence, pp. 4341\u20134348 (2017)","DOI":"10.1609\/aaai.v31i1.11221"},{"issue":"1","key":"909_CR26","doi-asserted-by":"publisher","first-page":"83873","DOI":"10.1109\/ACCESS.2019.2924944","volume":"7","author":"JM Zhang","year":"2019","unstructured":"Zhang, J.M., Wu, Y., Feng, W.J., Wang, J.: Spatially attentive visual tracking using multi-model adaptive response fusion. IEEE Access. 7(1), 83873\u201383887 (2019)","journal-title":"IEEE Access."},{"issue":"1","key":"909_CR27","doi-asserted-by":"publisher","first-page":"297","DOI":"10.32604\/cmc.2019.04097","volume":"59","author":"LL Pan","year":"2019","unstructured":"Pan, L.L., Qin, J.H., Chen, H., Xiang, X.Y., Li, C., Chen, R.: Image augmentation-based food recognition with convolutional neural networks. Comput. Mater. Continua. 59(1), 297\u2013313 (2019)","journal-title":"Comput. Mater. Continua."},{"key":"909_CR28","doi-asserted-by":"publisher","first-page":"87534","DOI":"10.1109\/ACCESS.2019.2924973","volume":"7","author":"WY Pan","year":"2019","unstructured":"Pan, W.Y., Qin, J.H., Xiang, X.Y., Wu, Y., Tan, Y., Xiang, L.Y.: A smart mobile diagnosis system for citrus diseases based on densely connected convolutional networks. IEEE Access. 7, 87534\u201387542 (2019)","journal-title":"IEEE Access."},{"issue":"5","key":"909_CR29","doi-asserted-by":"publisher","first-page":"3345","DOI":"10.3934\/mbe.2019167","volume":"16","author":"JM Zhang","year":"2019","unstructured":"Zhang, J.M., Lu, C.Q., Li, X.D., Kim, H.J., Wang, J.: A full convolutional network based on DenseNet for remote sensing scene classification. Math. Biosci. Eng. 16(5), 3345\u20133367 (2019)","journal-title":"Math. Biosci. Eng."},{"issue":"5","key":"909_CR30","doi-asserted-by":"publisher","first-page":"5851","DOI":"10.3934\/mbe.2019292","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang, J., Qin, J.H., Xiang, X.Y., Tan, Y., Pan, N.: CAPTCHA recognition based on deep convolutional neural network. Math. Biosci. Eng. 16(5), 5851\u20135861 (2019)","journal-title":"Math. Biosci. Eng."},{"key":"909_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6562-8","author":"JM Zhang","year":"2018","unstructured":"Zhang, J.M., Jin, X.K., Sun, J., Wang, J., Sangaiah, A.K.: Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools Appl. (2018). https:\/\/doi.org\/10.1007\/s11042-018-6562-8","journal-title":"Multimedia Tools Appl."},{"issue":"13","key":"909_CR32","doi-asserted-by":"publisher","first-page":"2686","DOI":"10.3390\/app9132686","volume":"9","author":"JM Zhang","year":"2019","unstructured":"Zhang, J.M., Lu, C.Q., Wang, J., Wang, L., Yue, X.G.: Concrete cracks detection based on FCN with dilated convolution. Appl. Sci. 9(13), 2686 (2019)","journal-title":"Appl. Sci."},{"issue":"1","key":"909_CR33","doi-asserted-by":"publisher","first-page":"43956","DOI":"10.1109\/ACCESS.2019.2908668","volume":"7","author":"JM Zhang","year":"2019","unstructured":"Zhang, J.M., Jin, X.K., Sun, J., Wang, J., Li, K.Q.: Dual model learning combined with multiple feature selection for accurate visual tracking. IEEE Access. 7(1), 43956\u201343969 (2019)","journal-title":"IEEE Access."},{"key":"909_CR34","doi-asserted-by":"crossref","unstructured":"Datar, M., Nicole, I., Piotr, I., Vahab, S.M.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on Computational geometry, pp. 253\u2013262 (2004)","DOI":"10.1145\/997817.997857"},{"issue":"4","key":"909_CR35","first-page":"206","volume":"4","author":"H Delfs","year":"2015","unstructured":"Delfs, H., Knebl, H.: Introduction to cryptography: principles and applications. Inf. Secur. Cryptogr. Texts Monogr. 4(4), 206\u2013207 (2015)","journal-title":"Inf. Secur. Cryptogr. Texts Monogr."},{"issue":"9","key":"909_CR36","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/34.955109","volume":"23","author":"JZ Wang","year":"2007","unstructured":"Wang, J.Z., Li, J., Wiederhold, G.: Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell. 23(9), 947\u2013963 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"909_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2919570","author":"ZL Zhou","year":"2019","unstructured":"Zhou, Z.L., Wu, J.N., Sun, X.M.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data. (2019). https:\/\/doi.org\/10.1109\/TBDATA.2019.2919570","journal-title":"IEEE Trans. Big Data."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00909-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00909-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00909-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T21:34:08Z","timestamp":1664400848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00909-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,16]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["909"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00909-3","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2019,9,16]]},"assertion":[{"value":"15 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}