International audienceThis work proposes a privacy-protection framework for an important application called outsourced media search. This scenario involves a data owner, a client, and an untrusted server, where the owner outsources a search service to the server. Due to lack of trust, the privacy of the client and the owner should be protected. The framework relies on multimedia hashing and symmetric encryption. It requires involved parties to participate in a privacy-enhancing protocol. Additional processing steps are carried out by the owner and the client: (i) before outsourcing low-level media features to the server, the owner has to one-way hash them, and partially encrypt each hash-value; (ii) the client completes the similarity searc...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
The extending numerous of websites the all web customers are extended with the immense measure of da...
Investigative journalists collect large numbers of digital documents during their investigations. Th...
International audienceThis work proposes a privacy-protection framework for an important application...
We propose a privacy protection framework for large-scale content-based information retrieval. It of...
Encrypted search — performing queries on protected data — is a well researched problem. However, exi...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
Abstract. We study the problem of private outsourced sorting of encrypted data. We start by proposin...
The emergence of cloud computing provides an unlimited computation/storage for users, and yields new...
Automated media classification is becoming increas-ingly common in areas ranging from mobile loca-ti...
In this work, we investigate the privacy-preserving properties of encryption algorithms in the speci...
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or do...
The ability to search databases by providing multimedia ex-amples of voices, faces, or locations ins...
Data sharing on public servers has become a popular ser-vice on the Internet, in which users can sto...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
The extending numerous of websites the all web customers are extended with the immense measure of da...
Investigative journalists collect large numbers of digital documents during their investigations. Th...
International audienceThis work proposes a privacy-protection framework for an important application...
We propose a privacy protection framework for large-scale content-based information retrieval. It of...
Encrypted search — performing queries on protected data — is a well researched problem. However, exi...
Information systems generally involve storage and analytics of large-scale data, many of which may b...
Abstract. We study the problem of private outsourced sorting of encrypted data. We start by proposin...
The emergence of cloud computing provides an unlimited computation/storage for users, and yields new...
Automated media classification is becoming increas-ingly common in areas ranging from mobile loca-ti...
In this work, we investigate the privacy-preserving properties of encryption algorithms in the speci...
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or do...
The ability to search databases by providing multimedia ex-amples of voices, faces, or locations ins...
Data sharing on public servers has become a popular ser-vice on the Internet, in which users can sto...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
The problem of efficiently searching into outsourced encrypted data, while providing strong privacy ...
The extending numerous of websites the all web customers are extended with the immense measure of da...
Investigative journalists collect large numbers of digital documents during their investigations. Th...