{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:36:11Z","timestamp":1770917771932,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Natural Science Foundation of Hebei Education Department of China","award":["QN2024204"],"award-info":[{"award-number":["QN2024204"]}]},{"name":"the National Natural Science Foundation of China","award":["61972073"],"award-info":[{"award-number":["61972073"]}]},{"name":"the Innovation Ability Improvement Program of Hebei Province of China","award":["22567638H"],"award-info":[{"award-number":["22567638H"]}]},{"name":"the Key Research and Development Program of Hebei Province of China","award":["223407010"],"award-info":[{"award-number":["223407010"]}]},{"name":"the Natural Science Foundation of Hebei Province of China","award":["F2022201005,F2023201033"],"award-info":[{"award-number":["F2022201005,F2023201033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3652583.3658065","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T06:30:40Z","timestamp":1717741840000},"page":"193-201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5408-0569","authenticated-orcid":false,"given":"Mingyue","family":"Li","sequence":"first","affiliation":[{"name":"Hebei University, Baoding, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5851-0525","authenticated-orcid":false,"given":"Yuting","family":"Zhu","sequence":"additional","affiliation":[{"name":"Hebei University, Baoding, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3952-2370","authenticated-orcid":false,"given":"Ruizhong","family":"Du","sequence":"additional","affiliation":[{"name":"Hebei University, Baoding, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5588-9690","authenticated-orcid":false,"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.04.009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031653"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114940"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06660-x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04748-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.07.005"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Colour texture descriptor for CBIR of diseased tomato leaf images using modified local zigzag pattern[J]","volume":"2022","author":"Gurubelli Y","unstructured":"Gurubelli Y, Ramanathan M, Ponnusamy P. Colour texture descriptor for CBIR of diseased tomato leaf images using modified local zigzag pattern[J]. Multimedia Tools and Applications, 2022: 1--19.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"A survey on data breach challenges in cloud computing security: Issues and threats[C]\/\/2017 International conference on circuit, power and computing technologies (ICCPCT)","volume":"2017","author":"Barona R","unstructured":"Barona R, Anita E A M. A survey on data breach challenges in cloud computing security: Issues and threats[C]\/\/2017 International conference on circuit, power and computing technologies (ICCPCT). IEEE, 2017: 1--8.","journal-title":"IEEE"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Secure and efficient image retrieval through invariant features selection in insecure cloud environments[J]","volume":"2021","author":"Kumar S","unstructured":"Kumar S, Pal A K, Islam S K, et al. Secure and efficient image retrieval through invariant features selection in insecure cloud environments[J]. Neural Computing and Applications, 2021: 1--26.","journal-title":"Neural Computing and Applications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117508"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.040"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.030"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"CryptoEyes: Privacy Preserving Classification over Encrypted Images[C]\/\/IEEE INFOCOM 2021-IEEE Conference on Computer Communications","volume":"2021","author":"He W","unstructured":"He W, Li S, Wang W, et al. CryptoEyes: Privacy Preserving Classification over Encrypted Images[C]\/\/IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, 2021: 1--10.","journal-title":"IEEE"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3032147"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.008"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2989923"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.095"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Wong W K Cheung D W Kao B et al. Secure kNN computation on encrypted databases[C]\/\/Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. 2009: 139--152.","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_3_2_1_19_1","volume-title":"ImageProof: Enabling authentication for large-scale image retrieval[C]\/\/2019 IEEE 35th International Conference on Data Engineering (ICDE)","author":"Guo S","year":"2019","unstructured":"Guo S, Xu J, Zhang C, et al. ImageProof: Enabling authentication for large-scale image retrieval[C]\/\/2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 2019: 1070--1081."},{"key":"e_1_3_2_1_20_1","volume-title":"Dynamic searchable symmetric encryption with forward and stronger backward privacy[C]\/\/European symposium on research in computer security","author":"Zuo C","year":"2019","unstructured":"Zuo C, Sun S F, Liu J K, et al. Dynamic searchable symmetric encryption with forward and stronger backward privacy[C]\/\/European symposium on research in computer security. Cham: Springer International Publishing, 2019: 283--303."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036"},{"key":"e_1_3_2_1_22_1","article-title":"Privacy-preserving multi-source image retrieval in edge computing[J]","author":"Yan Y","year":"2022","unstructured":"Yan Y, Xu Y, Wang Z, et al. Privacy-preserving multi-source image retrieval in edge computing[J]. IEEE Transactions on Services Computing, 2022.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3131176"},{"key":"e_1_3_2_1_24_1","article-title":"DSE-RB: A privacy-preserving dynamic searchable encryption framework on redactable blockchain[J]","author":"Li M","year":"2022","unstructured":"Li M, Jia C, Du R, et al. DSE-RB: A privacy-preserving dynamic searchable encryption framework on redactable blockchain[J]. IEEE Transactions on Cloud Computing, 2022.","journal-title":"IEEE Transactions on Cloud Computing"}],"event":{"name":"ICMR '24: International Conference on Multimedia Retrieval","location":"Phuket Thailand","acronym":"ICMR '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2024 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652583.3658065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T08:51:19Z","timestamp":1755766279000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":24,"alternative-id":["10.1145\/3652583.3658065","10.1145\/3652583"],"URL":"https:\/\/doi.org\/10.1145\/3652583.3658065","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}