{"id":"https://openalex.org/W2966988368","doi":"https://doi.org/10.1109/access.2019.2935222","title":"Intelligent and Secure Content-Based Image Retrieval for Mobile Users","display_name":"Intelligent and Secure Content-Based Image Retrieval for Mobile Users","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2966988368","doi":"https://doi.org/10.1109/access.2019.2935222","mag":"2966988368"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2935222","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935222","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08798734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08798734.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100394605","display_name":"Fei Liu","orcid":"https://orcid.org/0000-0002-1741-2170"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101909822","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-0422-5691"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-0422-5691","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088034036","display_name":"Fanchuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan-Chuan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100715812","display_name":"Yongzheng Zhang","orcid":"https://orcid.org/0000-0002-1895-9215"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong-Zheng Zhang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030005076","display_name":"Jie Lin","orcid":"https://orcid.org/0000-0002-8971-0660"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Lin","raw_affiliation_strings":["School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100394605"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.9198,"has_fulltext":true,"cited_by_count":49,"citation_normalized_percentile":{"value":0.94941035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"119209","last_page":"119222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8844414949417114},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.7278447151184082},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6871424317359924},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6113497614860535},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5823569893836975},{"id":"https://openalex.org/keywords/content-based-image-retrieval","display_name":"Content-based image retrieval","score":0.5494994521141052},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5433157682418823},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5326706171035767},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5241235494613647},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43711942434310913},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42250603437423706},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4063042402267456},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40025684237480164},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3995242714881897},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25363022089004517}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8844414949417114},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.7278447151184082},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6871424317359924},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6113497614860535},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5823569893836975},{"id":"https://openalex.org/C2780052074","wikidata":"https://www.wikidata.org/wiki/Q1128648","display_name":"Content-based image retrieval","level":4,"score":0.5494994521141052},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5433157682418823},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5326706171035767},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5241235494613647},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43711942434310913},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42250603437423706},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4063042402267456},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40025684237480164},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3995242714881897},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25363022089004517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2935222","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935222","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08798734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:776cd4895170472d9881977754e05081","is_oa":true,"landing_page_url":"https://doaj.org/article/776cd4895170472d9881977754e05081","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 119209-119222 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2935222","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2935222","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08798734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7065587098","display_name":null,"funder_award_id":"2018YFB0804702","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2966988368.pdf","grobid_xml":"https://content.openalex.org/works/W2966988368.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1488338708","https://openalex.org/W1494049356","https://openalex.org/W1590823599","https://openalex.org/W1686810756","https://openalex.org/W1755636270","https://openalex.org/W1928483324","https://openalex.org/W1970606468","https://openalex.org/W1973393984","https://openalex.org/W1989870484","https://openalex.org/W1992282993","https://openalex.org/W2017434761","https://openalex.org/W2020498246","https://openalex.org/W2088492763","https://openalex.org/W2108834246","https://openalex.org/W2132172731","https://openalex.org/W2146689436","https://openalex.org/W2163605009","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2233233025","https://openalex.org/W2261315131","https://openalex.org/W2336376330","https://openalex.org/W2378756712","https://openalex.org/W2435473771","https://openalex.org/W2439367678","https://openalex.org/W2525788160","https://openalex.org/W2554750353","https://openalex.org/W2563227364","https://openalex.org/W2616664865","https://openalex.org/W2620512600","https://openalex.org/W2701059868","https://openalex.org/W2765200655","https://openalex.org/W2794927157","https://openalex.org/W2806203604","https://openalex.org/W2942255051","https://openalex.org/W2963106566","https://openalex.org/W4297952240","https://openalex.org/W6637373629","https://openalex.org/W6672487846","https://openalex.org/W6684191040","https://openalex.org/W6717974185","https://openalex.org/W6748082217"],"related_works":["https://openalex.org/W2044706866","https://openalex.org/W2746816529","https://openalex.org/W2900811989","https://openalex.org/W2341223103","https://openalex.org/W2905186525","https://openalex.org/W4367727948","https://openalex.org/W3198880640","https://openalex.org/W2031096531","https://openalex.org/W2273467235","https://openalex.org/W2803523611"],"abstract_inverted_index":{"With":[0],"the":[1,8,38,75,78,93,102,110,136,156],"tremendous":[2],"growth":[3],"of":[4,40,44,96,143],"smart":[5],"mobile":[6,42],"devices,":[7],"Content-Based":[9],"Image":[10],"Retrieval":[11],"(CBIR)":[12],"becomes":[13],"popular":[14],"and":[15,54,63,121,133,181],"has":[16,23],"great":[17],"market":[18],"potentials.":[19],"Secure":[20],"image":[21,55,72,150],"retrieval":[22,73],"attracted":[24],"considerable":[25],"interests":[26],"recently":[27],"due":[28],"to":[29,91,127,131,159],"users'":[30],"security":[31],"concerns.":[32],"However,":[33],"it":[34],"still":[35],"suffers":[36],"from":[37],"challenges":[39],"relieving":[41],"devices":[43],"excessive":[45],"computation":[46,119],"burdens,":[47],"such":[48],"as":[49],"data":[50],"encryption,":[51],"feature":[52],"extraction,":[53],"similarity":[56,151],"scoring.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"propose":[62,147],"implement":[64,115],"an":[65,97],"IND-CPA":[66],"secure":[67,149],"CBIR":[68],"framework":[69,130,178],"that":[70,176],"performs":[71],"on":[74],"cloud":[76,157],"without":[77,163],"user's":[79],"constant":[80],"interaction.":[81],"A":[82],"pre-trained":[83],"deep":[84,94,137,169],"CNN":[85,124,138],"model,":[86],"i.e.,":[87],"VGG-16,":[88],"is":[89,105,179],"used":[90],"extract":[92],"features":[95],"image.":[98],"The":[99,171],"information":[100,166],"about":[101,167],"neural":[103],"network":[104],"strictly":[106],"concealed":[107],"by":[108],"utilizing":[109],"lattice-based":[111],"homomorphic":[112],"scheme.":[113],"We":[114,145],"a":[116,122,140,148],"real":[117],"number":[118,142],"mechanism":[120],"divide-and-conquer":[123],"evaluation":[125],"protocol":[126],"enable":[128],"our":[129,177],"securely":[132],"efficiently":[134],"evaluate":[135],"with":[139],"large":[141],"inputs.":[144],"further":[146],"scoring":[152],"protocol,":[153],"which":[154],"enables":[155],"servers":[158],"compare":[160],"two":[161],"images":[162],"knowing":[164],"any":[165],"their":[168],"features.":[170],"comprehensive":[172],"experimental":[173],"results":[174],"show":[175],"efficient":[180],"accurate.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
