A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing

Z Xia, X Wang, L Zhang, Z Qin, X Sun… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the increasing importance of images in people's daily life, content-based image
retrieval (CBIR) has been widely studied. Compared with text documents, images consume …

A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment

M Zhang, Y Chen, J Lin - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Nowadays, patients' physiological data and medical records are outsourced to the medical
cloud to help the patients and doctors to obtain valuable and reliable services, ie, diagnosis …

Sketching data sets for large-scale learning: Keeping only what you need

R Gribonval, A Chatalic, N Keriven… - IEEE Signal …, 2021 - ieeexplore.ieee.org
Big data can be a blessing: with very large training data sets it becomes possible to perform
complex learning tasks with unprecedented accuracy. Yet, this improved performance …

Content based image retrieval using deep learning process

RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

Z Xia, NN Xiong, AV Vasilakos, X Sun - Information Sciences, 2017 - Elsevier
The content-based image retrieval (CBIR) has been widely studied along with the increasing
importance of images in our daily life. Compared with the text documents, images consume …

Efficient and privacy-preserving similarity range query over encrypted time series data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Similarity query over time series data plays a significant role in various applications, such as
signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the …

SetRkNN: Efficient and privacy-preserving set reverse kNN query in cloud

Y Zheng, R Lu, H Zhu, S Zhang, Y Guan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The advance of cloud computing has driven a new paradigm of outsourcing large-scale data
and data-driven services to public clouds. Due to the increased awareness of privacy …

Secure biometrics: Concepts, authentication architectures, and challenges

S Rane, Y Wang, SC Draper… - IEEE Signal Processing …, 2013 - ieeexplore.ieee.org
Biometrics are an important and widely used class of methods for identity verification and
access control. Biometrics are attractive because they are inherent properties of an …

BLIND: A privacy preserving truth discovery system for mobile crowdsensing

V Agate, P Ferraro, GL Re, SK Das - Journal of Network and Computer …, 2024 - Elsevier
Nowadays, an increasing number of applications exploit users who act as intelligent sensors
and can quickly provide high-level information. These users generate valuable data that, if …