{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:49Z","timestamp":1725496609797},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icmew.2015.7169799","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T21:23:21Z","timestamp":1438291401000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Privacy preserving multimedia content identification for cloud based bag-of-feature architectures"],"prefix":"10.1109","author":[{"given":"Sviatoslav","family":"Voloshynovskiy","sequence":"first","affiliation":[]},{"given":"Maurits","family":"Diephuis","sequence":"additional","affiliation":[]},{"given":"Taras","family":"Holotyak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6467443"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CBMI.2012.6269815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995616"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.228"},{"key":"ref14","article-title":"On accuracy, robustness and security of bag-of-word search systems","author":"voloshynovskiy","year":"2014","journal-title":"Proceedings of SPIE Photonics West Electronic Imaging Media Forensics and Security V"},{"key":"ref15","first-page":"304","article-title":"Hamming embedding and weak geometric consistency for large scale image search","author":"jegou","year":"2008","journal-title":"European Conference on Computer Vision"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"ref6","article-title":"Private content identification based on soft fingerprinting","author":"voloshynovskiy","year":"2011","journal-title":"Proceedings of SPIE Photonics West Electronic Imaging\/Media Forensics and Security XI"},{"key":"ref5","article-title":"On privacy preserving search in large scale distributed systems: a signal processing view on searchable encryption","author":"voloshynovskiy","year":"2009","journal-title":"Proceedings of the International Workshop on Signal Processing in the EncryptEd Domain"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707797"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1117\/12.2022286","article-title":"Quantized embeddings: An efficient and universal nearest neighbor method for cloud-based image retrieval","author":"rane","year":"2013","journal-title":"SPIE Optics Photonics Applications of Digital Image Processing XXX"},{"journal-title":"Security with Noisy Data On Private Biometrics Secure Key Storage and Anti-Counterfeiting","year":"2007","author":"tuyls","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","article-title":"Efficient privacy-preserving face recognition","author":"sadeghi","year":"2010","journal-title":"Information, Security and Cryptology - ICISC 2009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482539"}],"event":{"name":"2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)","start":{"date-parts":[[2015,6,29]]},"location":"Turin, Italy","end":{"date-parts":[[2015,7,3]]}},"container-title":["2015 IEEE International Conference on Multimedia &amp; Expo Workshops (ICMEW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7162922\/7169738\/07169799.pdf?arnumber=7169799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:48:08Z","timestamp":1602690488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7169799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icmew.2015.7169799","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}