{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:19:49Z","timestamp":1771467589619,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3103100"],"award-info":[{"award-number":["2022YFB3103100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3101201"],"award-info":[{"award-number":["2021YFB3101201"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1005600"],"award-info":[{"award-number":["2020YFB1005600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2019B1515120010"],"award-info":[{"award-number":["2019B1515120010"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122032"],"award-info":[{"award-number":["62122032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172233"],"award-info":[{"award-number":["62172233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102189"],"award-info":[{"award-number":["62102189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032020"],"award-info":[{"award-number":["62032020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071122"],"award-info":[{"award-number":["62071122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936118"],"award-info":[{"award-number":["U1936118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932011"],"award-info":[{"award-number":["61932011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61931004"],"award-info":[{"award-number":["61931004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Guangdong Basic and Applied Research Project","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"DOI":"10.13039\/501100010014","name":"Six Peak Talent Project of Jiangsu Province","doi-asserted-by":"publisher","award":["R2016L13"],"award-info":[{"award-number":["R2016L13"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013088","name":"Qinglan Project of Jiangsu Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013088","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u201c333\u201d Project of Jiangsu Province"},{"name":"National Joint Engineering Research Center for Network Security Detection and Protection Technology"},{"name":"Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund"},{"name":"Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, China"},{"name":"BK21+ Program from the Ministry of Education of Korea"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tip.2023.3295741","type":"journal-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T17:37:18Z","timestamp":1691602638000},"page":"4635-4648","source":"Crossref","is-referenced-by-count":30,"title":["Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4874-4071","authenticated-orcid":false,"given":"Xiang","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Science and Technology Innovation, Dongguan University of Technology, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1782-0075","authenticated-orcid":false,"given":"Xueli","family":"Zhao","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Engineering Research Center of Trustworthy AI, Ministry of Education, College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"given":"Qian","family":"Feng","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Engineering Research Center of Trustworthy AI, Ministry of Education, College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0056-4300","authenticated-orcid":false,"given":"Peipeng","family":"Yu","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Engineering Research Center of Trustworthy AI, Ministry of Education, College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"National and Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Engineering Research Center of Trustworthy AI, Ministry of Education, College of Information Science and Technology, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3035666"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3218894"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907081"},{"key":"ref14","first-page":"1441","article-title":"A lightweight privacy-preserving CNN feature extraction framework for mobile sensing","volume":"18","author":"huang","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref31","year":"2004","journal-title":"Affine Covariant Regions Datasets"},{"key":"ref30","year":"2022","journal-title":"Code for Implementing Sift Algorithm"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3200724"},{"key":"ref33","first-page":"2","article-title":"PCA-SIFT: A more distinctive representation for local image descriptors","volume":"2","author":"ke","year":"2004","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2866405"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.188"},{"key":"ref2","author":"media","year":"2022","journal-title":"Security Attack Hits Illinois Fertility Centers"},{"key":"ref1","author":"strange","year":"2022","journal-title":"Jennifer Lawrence and Other Celebs Hacked as Nude Photos Circulate on the Web"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","article-title":"Image feature extraction in encrypted domain with privacy-preserving SIFT","volume":"21","author":"hsu","year":"2012","journal-title":"IEEE Trans Image Process"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3215248"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874256"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref25","first-page":"218","article-title":"How to play any mental game or a completeness theorem for protocols with honest majority","author":"goldreich","year":"1987","journal-title":"Proc 19th Annu ACM Symp Theory Comput"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2751476"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3073171"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"ref29","year":"2019","journal-title":"Code for Implementing Sift Algorithm"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.39"},{"key":"ref7","first-page":"595","article-title":"Privacy protection in interactive content based image retrieval","volume":"17","author":"huang","year":"2020","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_10"},{"key":"ref4","first-page":"420","article-title":"Efficient multiparty protocols using circuit randomization","author":"beaver","year":"1991","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2927215"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/9991910\/10214250.pdf?arnumber=10214250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T18:27:25Z","timestamp":1693852045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10214250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/tip.2023.3295741","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}