{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:20:29Z","timestamp":1775578829305,"version":"3.50.1"},"reference-count":56,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"vor","delay-in-days":263,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372478"],"award-info":[{"award-number":["62372478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2022JJ31019"],"award-info":[{"award-number":["2022JJ31019"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Frequent data breaches in the cloud environment have seriously affected cloud subscribers and providers. Privacy\u2010preserving image retrieval methods can improve the security of cloud image retrieval; however, existing methods have limited accuracy on dynamically updated image databases and mobile lightweight devices. In this study, we propose a privacy\u2010preserving image retrieval method based on disordered local histograms and vision transformer in cloud computing, by designing a multiple encryption method and transformer\u2010based feature model to better mine the local feature value of encrypted images. Specifically, the user performs different value substitution, position substitution, and color substitution on the subblocks of the image to protect the image information. The cloud server extracts the unordered local histogram from the encrypted image and generates retrievable features using transformer. Experiments show that compared with similar CNN schemes, the retrieval accuracy of this method is improved by 8.5%, and the retrieval efficiency is improved by 54.8%.<\/jats:p>","DOI":"10.1155\/2023\/8931092","type":"journal-article","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T19:35:06Z","timestamp":1695324906000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy\u2010Preserving Image Retrieval Based on Disordered Local Histograms and Vision Transformer in Cloud Computing"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5730-4537","authenticated-orcid":false,"given":"Zhangdong","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7549-7731","authenticated-orcid":false,"given":"Jiaohua","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2778-7531","authenticated-orcid":false,"given":"Xuyu","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9855-8234","authenticated-orcid":false,"given":"Yun","family":"Tan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2995348"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3012157"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3031440"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"SecurityI. Cost of a data breach report 2022 2022 https:\/\/www.ibm.com\/security\/data-breach.","DOI":"10.12968\/S1353-4858(22)70049-9"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijaacs.2022.125416"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2894411"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3110300"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2015.2491933"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2020.2991171"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijaacs.2021.119124"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.02.003"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2937098"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3040180"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3088869"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.23082"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101631"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.119"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijaacs.2022.123460"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3038218"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2017.2669999"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2016.2568460"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2894673"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"AbduljabbarZ. JinH. andIbrahimA. Privacy-preserving image retrieval in iot-cloud Proceedings of the 2016 IEEE Trustcom\/Bigdatase\/Ispa August 2016 Tianjin China 799\u2013806.","DOI":"10.1109\/TrustCom.2016.0141"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3032147"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00734-w"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/math8061019"},{"key":"e_1_2_11_27_2","unstructured":"DosovitskiyA. BeyerL. andKolesnikovA. An image is worth 16x16 words: transformers for image recognition at scale 2021 https:\/\/arxiv.org\/abs\/2010.11929."},{"key":"e_1_2_11_28_2","unstructured":"BaiY. MeiJ. YuilleA. L. andXieC. Are transformers more robust than cnns? 2021 https:\/\/arxiv.org\/abs\/2111.05464."},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2012.2204272"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2017.2712148"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"BellafqiraR. CoatrieuxG. BouslimiD. andQuellecG. Content based image retrieval in homomorphic encryption domain Proceedings of the 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) November 2015 Milan Italy 2944\u20132947.","DOI":"10.1109\/EMBC.2015.7319009"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102021"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2014.2307057"},{"key":"e_1_2_11_34_2","doi-asserted-by":"crossref","unstructured":"ChengB. ZhuoL. BaiY. PengY. andZhangJ. Secure index construction for privacy-preserving large-scale image retrieval Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing February 2014 Sydney NSW Australia 116\u2013120.","DOI":"10.1109\/BDCloud.2014.36"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2153-7"},{"key":"e_1_2_11_36_2","article-title":"Similarity search for encrypted images in secure cloud computing","volume":"7161","author":"Li Y.","year":"2020","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2019.2956527"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2021.3106482"},{"key":"e_1_2_11_39_2","doi-asserted-by":"crossref","unstructured":"HuangJ. Accelerating privacy-preserving image retrieval with multi-index hashing Proceedings of the 2022 IEEE\/ACM 7th Symposium on Edge Computing (SEC) December 2022 Seattle WA USA 492\u2013497.","DOI":"10.1109\/SEC54971.2022.00075"},{"key":"e_1_2_11_40_2","article-title":"Enabling search over encrypted multimedia databases","volume":"7254","author":"Lu W.","year":"2009","journal-title":"Electronic Imaging"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/info8030096"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.02688"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2913217"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492705"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117508"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22890"},{"key":"e_1_2_11_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3233421"},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3015886"},{"key":"e_1_2_11_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/34.955109"},{"key":"e_1_2_11_50_2","first-page":"304","article-title":"Hamming embedding and weak geometric consistency for large scale image search","volume":"5302","author":"Jegou H.","year":"2008","journal-title":"European Conference on Computer Vision"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2590944"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.030"},{"key":"e_1_2_11_53_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep residual learning for image recognition Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) June 2016 Las Vegas NV USA 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_11_54_2","unstructured":"WangW. XieE. LiX. LuT. LuoP. andShaoL. Pvtv2: improved baselines with pyramid vision transformer 2021 https:\/\/arxiv.org\/abs\/2106.13797."},{"key":"e_1_2_11_55_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.806980"},{"key":"e_1_2_11_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103440"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8931092.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8931092.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/8931092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:41:58Z","timestamp":1735623718000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/8931092"}},"subtitle":[],"editor":[{"given":"Vasudevan","family":"Rajamohan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/8931092"],"URL":"https:\/\/doi.org\/10.1155\/2023\/8931092","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-12-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8931092"}}