{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:48:45Z","timestamp":1725716925468},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10020398","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T19:35:23Z","timestamp":1674761723000},"page":"6454-6459","source":"Crossref","is-referenced-by-count":2,"title":["Identification of Encrypted Images Based on Image Statistics"],"prefix":"10.1109","author":[{"given":"Stanislaw","family":"Kazmierczak","sequence":"first","affiliation":[{"name":"Warsaw University of Technology,Faculty of Mathematics and Information Science,Warsaw,Poland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"IEEE Big Data Cup 2022 Report: Privacy preserving matching of encrypted images","volume-title":"2022 IEEE International Conference on Big Data, BigData 2022, Osaka, Japan, December 17 - 20, 2022","author":"Janusz","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5012496"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/el.2017.4426"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107340"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115670"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/25\/10\/100503"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3541-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696121"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00020"},{"article-title":"Improved regularization of convolutional neural networks with cutout","year":"2017","author":"DeVries","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7000"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2018.8363576"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3049346"},{"article-title":"Somewhat practical fully homomorphic encryption","year":"2012","author":"Fan","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref19","article-title":"Fully homomorphic encryption without bootstrapping","volume-title":"Cryptology ePrint Archive, Paper 2011\/277","author":"Brakerski","year":"2011"},{"key":"ref20","article-title":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","volume-title":"Cryptology ePrint Archive, Paper 2013\/094","author":"Lopez-Alt","year":"2013"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-40041-4_5","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","volume-title":"Cryptology ePrint Archive, Paper 2013\/340","author":"Gentry","year":"2013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.08.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/2324989"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0539-3"},{"key":"ref27","article-title":"Arnold\u2019s cat map image"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633969"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2022,12,17]]},"location":"Osaka, Japan","end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10020398.pdf?arnumber=10020398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:41:14Z","timestamp":1707810074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10020398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020398","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}