A review on protection and cancelable techniques in biometric systems
JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …
constituted by the mechanisms which provide access to a number of services or …
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment
Nowadays, patients' physiological data and medical records are outsourced to the medical
cloud to help the patients and doctors to obtain valuable and reliable services, ie, diagnosis …
cloud to help the patients and doctors to obtain valuable and reliable services, ie, diagnosis …
Sketching data sets for large-scale learning: Keeping only what you need
R Gribonval, A Chatalic, N Keriven… - IEEE Signal …, 2021 - ieeexplore.ieee.org
Big data can be a blessing: with very large training data sets it becomes possible to perform
complex learning tasks with unprecedented accuracy. Yet, this improved performance …
complex learning tasks with unprecedented accuracy. Yet, this improved performance …
Content based image retrieval using deep learning process
RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …
digital images from a large database. A variety of visual feature extraction techniques have …
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …
importance of images in our daily life. Compared with the text documents, images consume …
Efficient and privacy-preserving similarity range query over encrypted time series data
Similarity query over time series data plays a significant role in various applications, such as
signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the …
signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the …
SetRkNN: Efficient and privacy-preserving set reverse kNN query in cloud
The advance of cloud computing has driven a new paradigm of outsourcing large-scale data
and data-driven services to public clouds. Due to the increased awareness of privacy …
and data-driven services to public clouds. Due to the increased awareness of privacy …
Secure biometrics: Concepts, authentication architectures, and challenges
Biometrics are an important and widely used class of methods for identity verification and
access control. Biometrics are attractive because they are inherent properties of an …
access control. Biometrics are attractive because they are inherent properties of an …
BLIND: A privacy preserving truth discovery system for mobile crowdsensing
Nowadays, an increasing number of applications exploit users who act as intelligent sensors
and can quickly provide high-level information. These users generate valuable data that, if …
and can quickly provide high-level information. These users generate valuable data that, if …