[1] Huang R W, Gui X L, Yu S, et al. Study of Privacy-preserving Framework for Cloud Storage[J]. Computer Science and Information Systems, 2011, 8(3): 801-819.
[2] Jain A K, Vailaya A. Image Retrieval Using Color and Shape[J]. Pattern Recognition, 1997, 29(8): 1233-1244.
[3] Ma W Y, Zhang H J. Benchmarking of Image Features for Content-based Retrieval[C]//The 32 Asilomar Conference on Signals, Systems & Computers. Los Alamitos: IEEE,1998: 253-257.
[4] Loncaric S. A Survey of Shape Analysis Techniques [J]. Pattern Recognition, 1998, 31(8):983-1001.
[5] Mokhtarian F. Silhouette-based Isolated Object Recognition through Curvature Scale Space[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,1995, 17(5): 539-544.
[6] 孟繁杰, 郭宝龙. 使用兴趣点局部分布特征及多示例学习的图像检索方法[J]. 西安电子科技大学学报, 2011, 38(2): 47-53.
Meng Fanjie, Guo Baolong. Image Retrieval by Using Local Distribution Features of Interest Points and Multiple-instance Learning [J]. Journal of Xidian University, 2011, 38(2): 47-53.
[7] 崔力, 陈玉坤, 韩宇. 视觉相似性图像质量评价方法[J]. 西安电子科技大学学报, 2012, 39(4): 155-160.
Cui Li, Chen Yukun, Han Yu. Visual Similarity Index for Image Quality Assessment [J]. Journal of Xidian University, 2012, 39(4): 155-160.
[8] Curtmola R, Garay J A, Kamara S, et al. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions[C]//Proceedings of ACM CCS. New York: ACM, 2006: 79-88.
[9] Boneh D, Crescenzo G D, Ostrovsky R, et al. Public Key Encryption with Keyword Search[C]//Proceedings of EUROCRYPT. Interlaken: Springer, 2004: 506-522.
[10] Wang C, Cao N, Li J, et al. Secure Ranked Keyword Search over Encrypted Cloud Data[C]//Proceedings of ICDCS. Berlin: Springer-Verlag, 2010: 506-522.
[11] Li J, Wang Q, Wang C, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE, 2010: 5462196.
[12] Cao N, Wang C, Li M, et al. Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE, 2011: 829-837.
[13] Kamara S, Lauter K. Cryptographic Cloud Storage[C]//LNCS. Heidelberg: Springer, 2010: 136-149.
[14] Boneh D, Waters B. Conjunctive, Subset, and Range Queries on Encrypted Data[C]//Proceedings of TCC. Heidelberg: Springer Verlag, 2007: 535-554.
[15] Agrawal S, Vaikuntanathan V, David M, et al. Functional Encryption for Inner Product Predicates from Learning with Errors [C]//LNCS. Heidelberg: Springer, 2011: 21-40.
[16] Martinez A, Serra J R. Semantic Access to a Database of Images: an Aapproach to Object-related Image Retrieval[C]//Proceedings of International Conference on Multimedia Computing and Systems. Los Alamitos: IEEE, 1999: 624-629.
[17] Chaum D, Creau C, Damgard I. Multiparty Unconditionally Secure Protocols[C]//Proceedings of the 20th Annual ACM Symposium on Theory of Computing. New York: ACM,1988: 11-19. |