{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:08Z","timestamp":1750219808676,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,13]],"date-time":"2017-01-13T00:00:00Z","timestamp":1484265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["Grants U1633114 and U1333127"],"award-info":[{"award-number":["Grants U1633114 and U1333127"]}]},{"name":"the International Science and Technology Cooperation and Exchange Program of Sichuan Province, China","award":["Grant 2015HH0040"],"award-info":[{"award-number":["Grant 2015HH0040"]}]},{"name":"China Postdoctoral Science Foundation funded project","award":["Grant 2014M562309"],"award-info":[{"award-number":["Grant 2014M562309"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,13]]},"DOI":"10.1145\/3036290.3036301","type":"proceedings-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T12:30:32Z","timestamp":1491568232000},"page":"111-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Image Feature Extraction with Homomorphic Encryption on Integer Vector"],"prefix":"10.1145","author":[{"given":"Yunfan","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Science and Technology on Communication Security Laboratory, Chengdu, China"}]},{"given":"Haomiao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Center for Cyber Security, UESTC Chengdu, China"}]},{"given":"Mengxi","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Engineering and Applied Science, The George Washington University, Chengdu, China"}]},{"given":"Honggang","family":"Wu","sequence":"additional","affiliation":[{"name":"The Second Research Institute, Civil Aviation Administration of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. Lawson \"SSDs boost instagram's speed on amazon EC2 \" Computer World Web. 21 Sep. 2012.  S. Lawson \"SSDs boost instagram's speed on amazon EC2 \" Computer World Web. 21 Sep. 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959888"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"e_1_3_2_1_4_1","volume-title":"Enabling search over encrypted multimedia databases,\" in Proc. of SPIE'09","author":"Lu W.","year":"2009","unstructured":"W. Lu , \" Enabling search over encrypted multimedia databases,\" in Proc. of SPIE'09 , 2009 . W. Lu, et al. \"Enabling search over encrypted multimedia databases,\" in Proc. of SPIE'09, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J. Bringer etal \"Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends \" Signal Processing Magazine 30.2(2013): 42--52.  J. Bringer et al. \"Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends \" Signal Processing Magazine 30.2(2013): 42--52.","DOI":"10.1109\/MSP.2012.2230218"},{"key":"e_1_3_2_1_6_1","volume-title":"Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction,\" in Proc. of SPIE'11","author":"Hsu C.-Y.","year":"2011","unstructured":"C.-Y. Hsu , \" Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction,\" in Proc. of SPIE'11 , 2011 . C.-Y. Hsu, et al. \"Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction,\" in Proc. of SPIE'11, 2011."},{"volume-title":"IEEE","year":"2014","key":"e_1_3_2_1_7_1","unstructured":"Zhou, Hongchao, and Gregory Wornell. \"Efficient homomorphic encryption on integer vectors and its applications,\" Information Theory and Applications Workshop (ITA) . IEEE , 2014 . Zhou, Hongchao, and Gregory Wornell. \"Efficient homomorphic encryption on integer vectors and its applications,\" Information Theory and Applications Workshop (ITA). IEEE, 2014."},{"volume-title":"Privacy-preserving outsourcing of image global feature detection,\" Global Communications Conference (GLOBECOM)","year":"2014","key":"e_1_3_2_1_8_1","unstructured":"Qin Z, Yan J, Ren K, \" Privacy-preserving outsourcing of image global feature detection,\" Global Communications Conference (GLOBECOM) , 2014 IEEE. IEEE , 2014: 710--715. Qin Z, Yan J, Ren K, et al. \"Privacy-preserving outsourcing of image global feature detection,\" Global Communications Conference (GLOBECOM), 2014 IEEE. IEEE, 2014: 710--715."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_31"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Packed ciphertexts in LWEbased homomorphic encryption,\" in Public-Key Cryptography - PKC, (LNCS)","author":"Brakerski Z.","year":"2013","unstructured":"Z. Brakerski , C. Gentry , and S. Halevi , \" Packed ciphertexts in LWEbased homomorphic encryption,\" in Public-Key Cryptography - PKC, (LNCS) vol. 7778 , pp. 1 -- 13 , 2013 . Z. Brakerski, C. Gentry, and S. Halevi, \"Packed ciphertexts in LWEbased homomorphic encryption,\" in Public-Key Cryptography - PKC, (LNCS) vol. 7778, pp. 1--13, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.927422"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27872-3_22"},{"volume-title":"IEEE","year":"2014","key":"e_1_3_2_1_14_1","unstructured":"Zhou, Hongchao, and Gregory Wornell. \"Efficient homomorphic encryption on integer vectors and its applications,\" Information Theory and Applications Workshop (ITA) . IEEE , 2014 . Zhou, Hongchao, and Gregory Wornell. \"Efficient homomorphic encryption on integer vectors and its applications,\" Information Theory and Applications Workshop (ITA). IEEE, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Brakerski Zvika Craig Gentry and Shai Halevi. \"Packed ciphertext in LWE-based homomorphic encryption \" Public Key Cryptography vol. 7778 2013.  Brakerski Zvika Craig Gentry and Shai Halevi. \"Packed ciphertext in LWE-based homomorphic encryption \" Public Key Cryptography vol. 7778 2013.","DOI":"10.1007\/978-3-642-36362-7_1"}],"event":{"name":"ICMLSC '17: 2017 International Conference on Machine Learning and Soft Computing","acronym":"ICMLSC '17","location":"Ho Chi Minh City Vietnam"},"container-title":["Proceedings of the 2017 International Conference on Machine Learning and Soft Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036290.3036301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3036290.3036301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:42Z","timestamp":1750217802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036290.3036301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,13]]},"references-count":15,"alternative-id":["10.1145\/3036290.3036301","10.1145\/3036290"],"URL":"https:\/\/doi.org\/10.1145\/3036290.3036301","relation":{},"subject":[],"published":{"date-parts":[[2017,1,13]]},"assertion":[{"value":"2017-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}