{"id":"https://openalex.org/W3166840214","doi":"https://doi.org/10.1109/cscwd49262.2021.9437677","title":"BEIR:A Blockchain-based Encrypted Image Retrieval Scheme","display_name":"BEIR:A Blockchain-based Encrypted Image Retrieval Scheme","publication_year":2021,"publication_date":"2021-05-05","ids":{"openalex":"https://openalex.org/W3166840214","doi":"https://doi.org/10.1109/cscwd49262.2021.9437677","mag":"3166840214"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd49262.2021.9437677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037037839","display_name":"Xianxian Li","orcid":"https://orcid.org/0000-0002-7083-3847"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xianxian Li","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","institution_ids":[]},{"raw_affiliation_string":"Security, Guilin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062642598","display_name":"Jie Li","orcid":"https://orcid.org/0000-0001-6511-4090"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","institution_ids":[]},{"raw_affiliation_string":"Security, Guilin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112115272","display_name":"Feng Yu","orcid":"https://orcid.org/0009-0001-0593-7658"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Yu","raw_affiliation_strings":["Key Laboratory of Computer Network and Information Integration, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044656190","display_name":"Xuemei Fu","orcid":"https://orcid.org/0000-0002-5681-3401"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuemei Fu","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","institution_ids":[]},{"raw_affiliation_string":"Security, Guilin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029516761","display_name":"Junhao Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"JunHao Yang","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","institution_ids":[]},{"raw_affiliation_string":"Security, Guilin, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091083031","display_name":"Yue Chen","orcid":"https://orcid.org/0000-0001-9592-0368"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Chen","raw_affiliation_strings":["Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-source Information Mining &#x0026; Security,Guilin,China","institution_ids":[]},{"raw_affiliation_string":"Security, Guilin, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037037839"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7745,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.73317542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"452","last_page":"457"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7681068181991577},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7388134002685547},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.70181804895401},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.571814239025116},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4831078052520752},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4564440846443176},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.4529283940792084},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43438491225242615},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3577217757701874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35356616973876953},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.34934544563293457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22014707326889038},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18609362840652466},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18545213341712952},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18515193462371826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09157383441925049}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681068181991577},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7388134002685547},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.70181804895401},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.571814239025116},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4831078052520752},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4564440846443176},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.4529283940792084},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43438491225242615},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3577217757701874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35356616973876953},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.34934544563293457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22014707326889038},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18609362840652466},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18545213341712952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18515193462371826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09157383441925049}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd49262.2021.9437677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G4883748357","display_name":null,"funder_award_id":"61672176,62062016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1262401806","https://openalex.org/W1519321993","https://openalex.org/W2001154722","https://openalex.org/W2152516507","https://openalex.org/W2469486851","https://openalex.org/W2487238101","https://openalex.org/W2493847351","https://openalex.org/W2781469847","https://openalex.org/W2790225875","https://openalex.org/W2792972284","https://openalex.org/W2810011639","https://openalex.org/W2910369831","https://openalex.org/W2912911621","https://openalex.org/W2980277939"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4289035754","https://openalex.org/W4304136894","https://openalex.org/W2989851257"],"abstract_inverted_index":{"Encrypted":[0],"image":[1,67,135],"retrieval":[2,68,144],"may":[3],"return":[4],"incorrect":[5],"or":[6],"incomplete":[7],"results":[8,44],"due":[9],"to":[10,38,108,112],"threats":[11],"from":[12],"malicious":[13],"cloud":[14,110],"servers.":[15],"Most":[16],"of":[17,27,30,32,35,42,48,61,88,99,125,134,148],"the":[18,23,33,40,46,49,57,73,77,81,86,91,95,104,109,123,132,141,149],"existing":[19],"solutions":[20],"focus":[21],"on":[22,76,90],"efficiency":[24],"and":[25,45,59,85,97,116,129,146],"accuracy":[26],"retrieval,":[28],"lack":[29],"verification":[31],"completeness":[34],"search":[36,43,50,100],"results,":[37,101],"achieve":[39],"reliability":[41],"transparency":[47],"process,":[51],"we":[52],"explore":[53],"characteristic":[54],"such":[55],"as":[56],"decentralization":[58],"tamper-proof":[60],"blockchain,":[62],"proposed":[63],"a":[64,118,153],"blockchain-based":[65],"encrypted":[66,74,106],"scheme.":[69],"This":[70],"scheme":[71,150],"stores":[72],"index":[75,120],"blockchain":[78,82],"(Ethereum),":[79],"through":[80],"consensus":[83],"mechanism":[84],"function":[87],"searching":[89],"smart":[92],"contract,":[93],"ensures":[94],"integrity":[96],"correctness":[98],"then":[102],"outsources":[103],"corresponding":[105],"images":[107],"server":[111],"reduce":[113],"storage":[114],"cost,":[115],"designs":[117],"double-layer":[119],"structure":[121],"using":[122],"bag":[124],"visual":[126],"word":[127],"model":[128],"simhash":[130],"in":[131],"process":[133],"similarity":[136],"index.":[137],"Experiments":[138],"show":[139],"that":[140],"reliability,":[142],"high":[143],"efficiency,":[145],"precision":[147],"also":[151],"have":[152],"good":[154],"privacy":[155],"protection":[156],"effect.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
