激光与光电子学进展, 2019, 56 (3): 031001, 网络出版: 2019-07-31   

一种加密遥感图像的安全外包搜索方案 下载: 902次

A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images
作者单位
1 上海海洋大学信息学院, 上海 201306
2 国家海洋局东海分局, 上海 200136
引用该论文

黄冬梅, 吴国健, 魏立斐, 魏泉苗, 戴亮. 一种加密遥感图像的安全外包搜索方案[J]. 激光与光电子学进展, 2019, 56(3): 031001.

Dongmei Huang, Guojian Wu, Lifei Wei, Quanmiao Wei, Liang Dai. A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031001.

参考文献

[1] . 基于文本的图像检索与基于内容的图像检索技术的比较研究[J]. 首都师范大学学报(自然科学版), 2012, 33(4): 6-9.

    Asiyan H. Comparative research of image retrieval based on text and content[J]. Journal of Capital Normal University (Natural Science Edition), 2012, 33(4): 6-9.

[2] 侯平, 陈荦, 程果. 一种多时相遥感影像存储管理的新方法[J]. 兵工自动化, 2010, 29(3): 63-67.

    Hou P, Chen L, Cheng G. A new method of multi-temporal remote sensing images storage management[J]. Ordnance Industry Automation, 2010, 29(3): 63-67.

[3] 吴一全, 王志来. 基于目标提取与引导滤波增强的红外与可见光图像融合[J]. 光学学报, 2017, 37(8): 0810001.

    Wu Y Q, Wang Z L. Infrared andvisible image fusion based on target extraction and guided filtering enhancement[J]. Acta Optica Sinica, 2017, 37(8): 0810001.

[4] 张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348.

    Zhang Y Q, Wang X F, Liu X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348.

[5] 姚丽莎, 朱珍元, 程家兴. DNA序列和分数阶Chen超混沌系统彩色图像加密[J]. 激光与光电子学进展, 2016, 53(9): 091003.

    Yao L S, Zhu Z Y, Cheng J X. Colorimage encryption algorithm based on DNA sequence operation and fractional order Chen hyper-chaotic system[J]. Laser & Optoelectronics Progress, 2016, 53(9): 091003.

[6] 白音布和, 吕晓东, 李根全, 等. 基于压缩感知的光学干涉双灰度图像加密系统[J]. 激光与光电子学进展, 2016, 53(4): 041002.

    Bai Y B H, Lü X D, Li G Q, et al. . Optical interference double gray image encryption system based on compressive sensing[J]. Laser & Optoelectronics Progress, 2016, 53(4): 041002.

[7] 项菲, 刘川意, 方滨兴, 等. 云计算环境下密文搜索算法的研究[J]. 通信学报, 2013, 34(7): 143-153.

    Xiang F, Liu C Y, Fang B X, et al. Research on ciphertext search for the cloud environment[J]. Journal on Communications, 2013, 34(7): 143-153.

[8] 朱保平, 张金康. 云环境中基于本体语义扩展的密文检索方案[J]. 南京理工大学学报(自然科学版), 2015, 39(4): 392-397.

    Zhu B P, Zhang J K. Scheme ofciphertext retrieval in cloud based on ontology semantic expansion[J]. Journal of Nanjing University of Science and Technology (Nature Science), 2015, 39(4): 392-397.

[9] 张春艳, 李京兵, 王双双. 基于离散小波变换和感知哈希的加密医学图像检索算法[J]. 计算机应用, 2018, 38(2): 539-544,572.

    Zhang C Y, Li J B, Wang S S. Encrypted image retrieval algorithm based on discrete wavelet transform and perceptual hash[J]. Journal of Computer Applications, 2018, 38(2): 539-544,572.

[10] 陈帆. 量化SIFT和同态加密的隐私保护图像检索方法[J]. 传感器与微系统, 2017, 36(5): 83-87.

    Chen F. Privacy preserving image retrieval method based on binary SIFT and homomorphic encryption[J]. Transducer and Microsystem Technologies, 2017, 36(5): 83-87.

[11] 秦姣华, 谢备, 向旭宇, 等. 融合多特征的图像检索算法[J]. 电讯技术, 2017, 57(9): 1023-1029.

    Qin J H, Xie B, Xiang X Y, et al. An image retrieval algorithm based on multi-feature fusion[J]. Telecommunication Engineering, 2017, 57(9): 1023-1029.

[12] 韩威, 申铭, 徐彦彦, 等. 一种云环境下JPEG图像的安全检索方法[J]. 计算机应用研究, 2017, 34(4): 1239-1243.

    Han W, Shen M, Xu Y Y, et al. Secure JPEG image retrieval method under cloud environment[J]. Application Research of Computers, 2017, 34(4): 1239-1243.

[13] 黄冬梅, 耿霞, 魏立斐, 等. 基于Henon映射的加密遥感图像的安全检索方案[J]. 软件学报, 2016, 27(7): 1729-1740.

    Huang D M, Geng X, Wei L F, et al. A secure query scheme on encrypted remote sensing images based on henon mapping[J]. Journal of Software, 2016, 27(7): 1729-1740.

[14] 耿霞. 支持密文搜索和运算的遥感图像加密研究[D]. 上海: 上海海洋大学, 2017.

    GengX. Remote sensing image encryption supporting ciphertext search and computation[D]. Shanghai: Shanghai Ocean University, 2017.

[15] 沈志荣, 薛巍, 舒继武. 可搜索加密机制研究与进展[J]. 软件学报, 2014, 25(4): 880-895.

    Shen Z R, Xue W, Shu J W. Survey on the research and development of searchable encryption schemes[J]. Journal of Software, 2014, 25(4): 880-895.

[16] Demir B, Bruzzone L. Hashing-based scalable remote sensing image search and retrieval in large archives[J]. IEEE Transactions on Geoscience and Remote Sensing, 2016, 54(2): 892-904.

[17] Lu WJ, Varna AL, SwaminathanA, et al. Secure image retrieval through feature protection[C]∥2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 2009: 1533- 1536.

[18] AilonN, ChazelleB. Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform[C]∥Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing-STOC'06, the Thirty-Eighth Annual ACM Symposium, 2006.

[19] IndykP, MotwaniR. Approximate nearest neighbors[C]∥Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing - STOC'98, the Thirtieth Annual ACM Symposium, 1998.

[20] 孙燮华. 图像加密算法与实践[M]. 北京: 科学出版社, 2013: 64- 74.

    Sun XH. Image encryption algorithms and practices[M]. Beijing: Science Press, 2013: 64- 74.

[21] Maniccam S S, Bourbakis N G. Image and video encryption using SCAN patterns[J]. Pattern Recognition, 2004, 37(4): 725-737.

[22] Wang F, You H J, Fu X Y. Adapted anisotropic Gaussian SIFT matching strategy for SAR registration[J]. IEEE Geoscience and Remote Sensing Letters, 2015, 12(1): 160-164.

[23] Dellinger F, Delon J, Gousseau Y, et al. SAR-SIFT: a SIFT-like algorithm for SAR images[J]. IEEE Transactions on Geoscience and Remote Sensing, 2015, 53(1): 453-466.

[24] Wang B S, Zhang J X, Lu L J, et al. A uniform SIFT-like algorithm for SAR image registration[J]. IEEE Geoscience and Remote Sensing Letters, 2015, 12(7): 1426-1430.

[25] Lowe D G. Distinctiveimage features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110.

[26] WangC, CaoN, LiJ, et al. Secure ranked keyword search over encrypted cloud data[C]∥IEEE 30th International Conference on Distributed Computing Systems, 2010: 253- 262.

[27] Cheon JH, KimM, KimM. Search-and-compute on encrypted data[M] ∥Heidelberg: Springer, 2015: 142- 159.

[28] 张璇, 彭朋, 黄勤龙. 数据库密文检索技术的设计与实现[J]. 云南大学学报(自然科学版), 2010, 32(6): 646-651,656.

    Zhang X, Peng P, Huang Q L. Design and implementation of query over encrypted data[J]. Journal of Yunnan University(Natural Sciences Edition), 2010, 32(6): 646-651, 656.

黄冬梅, 吴国健, 魏立斐, 魏泉苗, 戴亮. 一种加密遥感图像的安全外包搜索方案[J]. 激光与光电子学进展, 2019, 56(3): 031001. Dongmei Huang, Guojian Wu, Lifei Wei, Quanmiao Wei, Liang Dai. A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031001.

本文已被 1 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!