Survey on Feature Extraction Techniques for Outsourced Encrypted Multimedia Content Data Analysis
Keywords:
Personal multimedia data, Outsourced Multimedia data, Cloud computing.Abstract
Currently, most data owners are interested in outsourcing their large amount of personal multimedia data in the cloud. In such cases, sometimes these outsourced multimedia data may disclose the private information of the owner of the information. Therefore, there is a need for a strong protocol. Currently, most of the techniques have been developed to support the efficient and safe extraction of functions over the outsourced multimedia data. These surveys also make comparative analysis of such techniques, which represents the advantages and limitations. Also after analyzing the techniques, the authors provide a general framework of the system that will be better than the proposed system.
References
- Hu S, Wang Q, Wang J, Qin Z, Ren K. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data," in IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411-3425, July 2016.
- Q. Wang, S. Hu, K. Ren, J. Wang, Z. Wang, and M. Du,
- "Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data,- in Proc. of INFOCOM'16, Accepted to appear, 2016.
- K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud,- IEEE Internet Computing, vol. 16, no.1, pp. 69–73, 2012.
- Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement,- IEEE Transactions on Parallel and Distributed Systems, 2015, DOI: 10.1109/TPDS.2015.2506573
- Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,- IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015.
- S. Salinas, C. Luo, X. Chen, and P. Li, "Efficient secure outsourcing of large-scale linear systems of equations,- in Proc. of INFOCOM'15.IEEE, 2015, pp. 1035–1043.
- L. Weng, L. Amsaleg, A. Morton, and S. Marchand Maillet, "A privacy-preserving framework for large-scale content-based information retrieval,- IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 152–167, 2015.
- C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, "Image feature extraction in encrypted domain with privacy-preserving sift,- IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593–4607, 2012.
- Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages,- in Proc. Of CRYPTO'11. Springer, 2011, pp. 505–524
- Z. Ren, L. Wang, Q. Wang and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems", IEEE Trans. Services Computing, vol. PP, no. 99, pp. 1, Sep. 2015.
- Y. Elmehdwi, B. K. Samanthula and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environments", Proc. IEEE ICDE, pp. 664-675.
- M. Osadchy, B. Pinkas, A. Jarrous and B. Moskovich, "SCiFI-A system for secure face identification", Proc. IEEE S&P, pp. 239-254.
- L. Zhang, T. Jung, C. Liu, X. Ding, X.-Y. Li and Y. Liu, "POP: Privacy-preserving outsourced photo sharing and searching for mobile devices", Proc. IEEE ICDCS, pp. 308-317.
- L. Zhang, T. Jung, P. Feng, K. Liu, X.-Y. Li and Y. Liu, "PIC: Enable large-scale privacy preserving content-based image search on cloud", Proc. IEEE ICPP, pp. 949-958.
- C.-Y. Hsu, C.-S. Lu and S. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT", IEEE Trans. Image Process., vol. 21, no. 11, pp. 4593-4607, Nov. 2012.
- http://www.webopedia.com/TERM/C/cloud_computing.html
- M. I. M. Almanea, "A Survey and Evaluation of the Existing Tools that Support Adoption of Cloud Computing and Selection of Trustworthy and Transparent Cloud Providers," Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on, Salerno, 2014, pp. 628-634.
- M.K. Khan and Q. Malluhi, "Establishing trust in cloud computing", IT Professional, vol. 12, no. 5, pp. 20-27, 2010.
- M.R. Savola, A. Juhola and I. Uusitalo, "Towards wider cloud service applicability by security privacy and trust measurements", 4th International Conference on Application of Information and Communication Technologies, 2010. Lambo, Why You Need A Cloud Rating System, 2013.
- S. Gagnono, V. Nabelsi, K. Passerini and K. Calisi, "The next web apps architecture: Challenges for saas vendors", IT Professional, vol. 13, no. 5, pp. 44-50, 201
- W. Pauley, "Cloud provider transparency: An empirical evaluation", IEEE Security and Privacy, vol. 8, no. 6, pp. 32-39, 2010.
- K.S. Garg, S. Versteeg and R. Buyya, A Framework for Ranking of Cloud Computing Services, 2012.
Remember the Windows XP operating system? You can work with it online at GeekPrank.com and trick your friends.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.