{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:08:34Z","timestamp":1762340914819,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"French project SecuLar","award":["ANR-12-CORD-0014"],"award-info":[{"award-number":["ANR-12-CORD-0014"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tkde.2016.2587258","type":"journal-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T16:16:21Z","timestamp":1467908181000},"page":"2738-2751","source":"Crossref","is-referenced-by-count":38,"title":["Privacy-Preserving Outsourced Media Search"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7540-7652","authenticated-orcid":false,"given":"Li","family":"Weng","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Amsaleg","sequence":"additional","affiliation":[]},{"given":"Teddy","family":"Furon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cryptography and Network Security","year":"2005","author":"stallings","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2007.4412887"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228096"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707797"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-005-4151-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238663"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749291"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454105"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2011.128"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-48533-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/026\/737400"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1117\/12.806980"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.805919"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2229783"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1780","DOI":"10.1155\/ASP.2005.1780","article-title":"Perceptual audio hashing functions","volume":"12","author":"\u00f6zer","year":"2005","journal-title":"EURASIP J Appl Signal Process"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038637"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230221"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2152394"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2007-078943"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref7","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"0","journal-title":"Proc ACM-SIAM Ann Symp Discrete Algorithms"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230218"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995616"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123149"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref21","first-page":"1","article-title":"Robust message-privacy preserving image copy detection for cloud-based systems","author":"diephuis","year":"0","journal-title":"Proc the International Workshop on Content-based Multimedia Indexing"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TIFS.2014.2375571","article-title":"Secure outsourced biometric authentication with performance evaluation on smartphones","volume":"10","author":"\u0161ed?nka","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref24","first-page":"3586","article-title":"What has my classifier learned? Visualizing the classification rules of bag-of-feature model by support region detection","author":"liu","year":"0","journal-title":"Proc IEEE Int Conf Comput Vis Pattern Recog"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902260"},{"key":"ref23","article-title":"A critical review of 10 years of privacy technology","author":"danezis","year":"0","journal-title":"Proc 4th Surveill Soc Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7563937\/07506092.pdf?arnumber=7506092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:39Z","timestamp":1641987759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7506092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":42,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2587258","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}