{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:05:37Z","timestamp":1729670737098,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cloudcom.2012.6427504","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T17:05:06Z","timestamp":1360343106000},"page":"845-850","source":"Crossref","is-referenced-by-count":1,"title":["Towards privacy-preserving image template matching in the clouds"],"prefix":"10.1109","author":[{"given":"Arash","family":"Nourian","sequence":"first","affiliation":[]},{"given":"Muthucumaru","family":"Maheswaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","first-page":"1","article-title":"Visual cryptography","author":"naor","year":"1994","journal-title":"Eurocrypt"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311884"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00062-5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.037"},{"key":"13","first-page":"465","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"2010","journal-title":"Proceedings of the 30th Annual Conference on Advances in Cryptology"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00029-2"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_36"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00373-007-0713-4"},{"key":"21","first-page":"131","article-title":"Sirius: Securing remote untrusted storage","author":"jin goh","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"20","first-page":"29","article-title":"Plutus: Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102135"},{"key":"23","article-title":"Secure data processing in a hybrid cloud","volume":"1982","author":"khadilkar","year":"2011","journal-title":"CoRR"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SRII.2011.14"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44864-0_99"},{"key":"27","first-page":"2010","article-title":"Implementing gentry's fully-homomorphic encryption scheme","volume":"520","author":"gentry","year":"2010","journal-title":"Cryptology ePrint Archive Report"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289206"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"10","article-title":"On-line signature verification based on template matching approach and support vector data description","volume":"12","author":"dong","year":"2010","journal-title":"International Conference on Computer Application and System Modeling"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"7","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1109\/TCSI.2008.918233","article-title":"Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems","volume":"55","author":"xie","year":"2008","journal-title":"IEEE Transactions on Circuits and Systems"},{"key":"6","first-page":"765","article-title":"The image hiding algorithm based on the mask matrix and dct transform","author":"xijing","year":"2011","journal-title":"2nd International Conference on Artificial Intelligence Management Science and Electronic Commerce"},{"key":"5","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1117\/12.465284","article-title":"A communications approach to image steganography","volume":"4","author":"eggers","year":"2002","journal-title":"Proceedings of SPIE Electronic Imaging Security and Watermarking of Multimedia Contents"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2008.4604412"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1088\/0031-9155\/56\/24\/008"}],"event":{"name":"2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2012,12,3]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2012,12,6]]}},"container-title":["4th IEEE International Conference on Cloud Computing Technology and Science Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6415464\/6427477\/06427504.pdf?arnumber=6427504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:13:37Z","timestamp":1498014817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6427504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2012.6427504","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}