[1] Ren K, Wang C, Wang Q. Security challenges for the public cloud[J]. Internet Computer, 2012, 16(1):69-73. [2] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy, Berkeley, USA, 2000:44-55. [3] Chang Y C, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data[C]//Proceeding of the Third International Conference on Applied Cryptography and Network Security, New York, NY, USA, 2005:442-455. [4] Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption:improved definitions and efficient constructions[C]//Proceedings of 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006:79-88. [5] Boneh D, Kushilevitz E, Ostrovsky R, Skeith Ⅲ W E. Public key encryption that allows pir queries[C]//Proceedings of 27th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA, 2007:50-67. [6] Cash D, Jaeger J, Jarecki S, Jutla C, Krawczyk H, Rosu M C, Steiner M. Dynamic searchable encryption in very large databases:data structures and implementation[C]//Proceedings of 21st Network and Distributed System Security Symposium, San Diego, California, USA, 2014. [7] Xia Z, Wang X, Sun X, Wang Q. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions Parallel and Distributed Systems, 2016, 27(2):340-352. [8] Li H, Liu D, Dai Y, Luan T, Yu S. Personalized search over encrypted data with efficient and secure updates in mobile clouds[J]. IEEE Transactions Emerging Topics in Computing, 2018, 6(1):97-109. [9] Lu W, Varna A L, Swaminathan A, Wu M. Secure image retrieval through feature protection[C]//Proceedings of 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Washington, DC, USA, 2009:1533-1536. [10] Lu W, Swaminathan A, Varna A L, Wu M. Enabling search over encrypted multimedia databases[C]//IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2009:725418-725418. [11] Hsu C Y, Lu C S, Pei S C. Image feature extraction in encrypted domain with privacy-preserving SIFT[J]. IEEE Transactions Image Processing, 2012, 21(11):4593-4607. [12] Zhang X, Cheng H. Histogram-based retrieval for encrypted JPEG images[C]//Proceeding of IEEE China Summit & International Conference on Signal and Information Processing, Xi'an, China, 2014:446-449. [13] Cheng H, Zhang X, Yu J, Li F. Markov process-based retrieval for encrypted JPEG images[J]. EURASIP Journal on Information Security, 2016:1-9. [14] Cheng H, Zhang X, Yu J, Zhang Y. Encrypted JPEG image retrieval using block-wise feature comparison[J] Visual Communication and Image Representation, 2016:111-117. [15] Lian S, Sun J, Wang Z. A novel image encryption scheme based-on JPEG encoding[C]//Proceedings of the Eighth International Conference on Information Visualisation, Piscataway, New Jersey, USA, 2004:217-220. [16] Yang B, Zhou C Q, Busch C, Niu X M. Transparent and perceptually enhanced JPEG image encryption[C]//Proceeding of 16th International Conference on Digital Signal Processing, Santorini, Greece, 2009:1-6. [17] Shreyamshakumar B K, Patil C R. JPEG image encryption using fuzzy PN sequences[J]. Signal Image Video Process, 2010, 4(4):419-427. [18] Minemura K, Moayed Z, Wong K, Qi X, Tanaka K. JPEG image scrambling without expansion in bitstream size[C]//Proceedings of 19th IEEE International Conference on Image Processing, Orlando, Florida, USA, 2012:261-264. [19] Macqueen J. Some methods for classification and analysis of multivariate observations[C]//Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, California, USA, 1967:281-297. [20] The image database used in this paper is available online at http://wang.ist.psu.edu/docs/related/ |