Laser & Optoelectronics Progress, Volume. 56, Issue 3, 031001(2019)
A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images
[14] Geng X. Remote sensing image encryption supporting ciphertext search and computation[D]. Shanghai: Shanghai Ocean University(2017).
[17] Lu W J, Varna A L, Swaminathan A et al. Secure image retrieval through feature protection. [C]∥2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 1533-1536(2009).
[18] Ailon N, Chazelle B. Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform. [C]∥Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing-STOC'06, the Thirty-Eighth Annual ACM Symposium(2006).
[19] Indyk P, Motwani R. Approximate nearest neighbors. [C]∥Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing - STOC'98, the Thirtieth Annual ACM Symposium(1998).
[20] Sun X H[M]. Image encryption algorithms and practices, 64-74(2013).
[26] Wang C, Cao N, Li J et al. Secure ranked keyword search over encrypted cloud data. [C]∥IEEE 30th International Conference on Distributed Computing Systems, 253-262(2010).
[27] Cheon J H, Kim M, Kim M. Search-and-compute on encrypted data[M]. ∥Heidelberg: Springer, 142-159(2015).
Get Citation
Copy Citation Text
Dongmei Huang, Guojian Wu, Lifei Wei, Quanmiao Wei, Liang Dai. A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031001
Category: Image Processing
Received: Jun. 5, 2018
Accepted: Aug. 11, 2018
Published Online: Jul. 31, 2019
The Author Email: Lifei Wei (Lfwei@shou.edu.cn)