Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Content based image retrieval using deep learning process
RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …
digital images from a large database. A variety of visual feature extraction techniques have …
A privacy-preserving framework for large-scale content-based information retrieval
We propose a privacy protection framework for large-scale content-based information
retrieval. It offers two layers of protection. First, robust hash values are used as queries to …
retrieval. It offers two layers of protection. First, robust hash values are used as queries to …
Privacy-preserving nearest neighbor methods: Comparing signals without revealing them
S Rane, PT Boufounos - IEEE Signal Processing Magazine, 2013 - ieeexplore.ieee.org
Comparing two signals is one of the most essential and prevalent tasks in signal processing.
A large number of applications fundamentally rely on determining the answers to the …
A large number of applications fundamentally rely on determining the answers to the …
Private approximate nearest neighbor search with sublinear communication
S Servan-Schreiber, S Langowski… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nearest neighbor search is a fundamental building-block for a wide range of applications. A
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …
Deep secure quantization: On secure biometric hashing against similarity-based attacks
The widespread application of biometric recognition has emerged solid protection on the
privacy of biometric templates. Non-invertible transformations such as random projections …
privacy of biometric templates. Non-invertible transformations such as random projections …
Exploring hashing and cryptonet based approaches for privacy-preserving speech emotion recognition
The outsourcing of machine learning classification and data mining tasks can be an effective
solution for those parties that need machine learning services, but lack the appropriate …
solution for those parties that need machine learning services, but lack the appropriate …
Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification
Similarity search is essential to many important applications and often involves searching at
scale on high-dimensional data based on their similarity to a query. In biometric …
scale on high-dimensional data based on their similarity to a query. In biometric …
Multi-user image retrieval with suppression of search pattern leakage
In image retrieval applications for multi-users, users can retrieve similar images in a
database. The server can collude with the user and exploit the search patterns to infer the …
database. The server can collude with the user and exploit the search patterns to infer the …
Privacy-preserving outsourced media search
This work proposes a privacy-protection framework for an important application called
outsourced media search. This scenario involves a data owner, a client, and an untrusted …
outsourced media search. This scenario involves a data owner, a client, and an untrusted …