{"id":"https://openalex.org/W4321484206","doi":"https://doi.org/10.1109/tii.2023.3246992","title":"Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing","display_name":"Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing","publication_year":2023,"publication_date":"2023-02-22","ids":{"openalex":"https://openalex.org/W4321484206","doi":"https://doi.org/10.1109/tii.2023.3246992"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2023.3246992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3246992","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072643373","display_name":"Mingyun Bian","orcid":"https://orcid.org/0000-0002-6787-9297"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingyun Bian","raw_affiliation_strings":["School of Communication and Information Engineering, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joseph Liu","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Clayton, VC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton, VC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057621404","display_name":"Shi-Feng Sun","orcid":"https://orcid.org/0000-0003-3742-5275"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shifeng Sun","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071724015","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0001-5867-1315"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["School of Communication and Information Engineering, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031618906","display_name":"Yanli Ren","orcid":"https://orcid.org/0000-0003-4510-7883"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanli Ren","raw_affiliation_strings":["School of Communication and Information Engineering, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072643373"],"corresponding_institution_ids":["https://openalex.org/I113940042"],"apc_list":null,"apc_paid":null,"fwci":1.0474,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80173496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"19","issue":"12","first_page":"11518","last_page":"11530"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7874729633331299},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7563456296920776},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6552410125732422},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5837090611457825},{"id":"https://openalex.org/keywords/local-binary-patterns","display_name":"Local binary patterns","score":0.5472344160079956},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.516836941242218},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4782120883464813},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4696221649646759},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45594844222068787},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.45423007011413574},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44660666584968567},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42527422308921814},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3798403739929199},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3445685803890228},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3394439220428467},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2942522168159485},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29302263259887695},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.23347845673561096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7874729633331299},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7563456296920776},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6552410125732422},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5837090611457825},{"id":"https://openalex.org/C87335442","wikidata":"https://www.wikidata.org/wiki/Q2494345","display_name":"Local binary patterns","level":4,"score":0.5472344160079956},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.516836941242218},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4782120883464813},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4696221649646759},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45594844222068787},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45423007011413574},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44660666584968567},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42527422308921814},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3798403739929199},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3445685803890228},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3394439220428467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2942522168159485},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29302263259887695},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.23347845673561096},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2023.3246992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3246992","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1961232708","display_name":null,"funder_award_id":"U22B2047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3282812662","display_name":null,"funder_award_id":"20ZR1419700","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G6916449496","display_name":null,"funder_award_id":"22ZR1481000","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1973393984","https://openalex.org/W2073532855","https://openalex.org/W2156030242","https://openalex.org/W2163352848","https://openalex.org/W2378756712","https://openalex.org/W2517729351","https://openalex.org/W2744473501","https://openalex.org/W2805308357","https://openalex.org/W2891406774","https://openalex.org/W2904573504","https://openalex.org/W2941360959","https://openalex.org/W2982058372","https://openalex.org/W3015070991","https://openalex.org/W3019200173","https://openalex.org/W3035446294","https://openalex.org/W3094198982","https://openalex.org/W3125803510","https://openalex.org/W3134610079","https://openalex.org/W3158764183","https://openalex.org/W3163536814","https://openalex.org/W3174171554","https://openalex.org/W3187158115","https://openalex.org/W3191243633","https://openalex.org/W3193762657","https://openalex.org/W3194493302","https://openalex.org/W3197742284","https://openalex.org/W3211645747","https://openalex.org/W4200153514","https://openalex.org/W4205109197","https://openalex.org/W4213079790","https://openalex.org/W4220984393","https://openalex.org/W4285151878","https://openalex.org/W6757599822","https://openalex.org/W6779607597"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2055219403","https://openalex.org/W2365629437","https://openalex.org/W2072918937","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2791313072","https://openalex.org/W2956602083","https://openalex.org/W3013119816"],"abstract_inverted_index":{"Rotation":[0],"invariant":[1],"local":[2,59,120],"binary":[3],"pattern":[4],"(RI-LBP)":[5],"features":[6,72,124,143],"have":[7],"been":[8],"applied":[9],"in":[10,173],"diverse":[11],"scenarios":[12],"with":[13,33,144],"the":[14,75,103,109,114,133,139,163,179,199,203,209],"advantages":[15],"of":[16,37,135,141,169],"gray-scale":[17],"and":[18,54,68,87,122,148,155,207],"rotation":[19],"invariance.":[20],"Secure":[21],"fog":[22,104],"computing":[23,42,105],"has":[24],"become":[25],"an":[26,145],"emerging":[27],"paradigm":[28],"for":[29,44,96,185],"enterprises":[30],"or":[31],"individuals":[32],"a":[34,92,174],"huge":[35],"volume":[36],"private":[38],"data,":[39],"but":[40],"limited":[41],"power":[43],"feature":[45,88,98,171],"extraction.":[46],"Prior":[47],"secure":[48,127],"outsourcing":[49],"protocols":[50],"based":[51,101],"on":[52,58,80,102,188],"LBP":[53],"RI-LBP":[55,97,205],"simply":[56],"focus":[57],"data":[60,85,121],"privacy,":[61],"which":[62,107],"can":[63,137,161],"only":[64],"resist":[65],"ciphertext-only":[66],"attack,":[67],"also":[69],"make":[70],"extracted":[71,123],"exposed":[73],"to":[74,82,166],"cloud.":[76],"This":[77],"work":[78],"focuses":[79],"how":[81],"effectively":[83],"ensure":[84],"confidentiality":[86],"integrity.":[89],"We":[90],"propose":[91],"verifiable":[93],"privacy-enhanced":[94],"protocol":[95],"extraction":[99,172],"(VRLBP)":[100],"paradigm,":[106],"mitigates":[108],"aforementioned":[110],"challenges":[111],"by":[112],"involving":[113],"proposed":[115],"symmetric":[116],"cryptographic":[117],"scheme":[118],"where":[119],"are":[125],"proven":[126],"against":[128],"chosen":[129],"plaintext":[130],"attack.":[131],"Meanwhile,":[132],"stage":[134],"verification":[136],"check":[138],"correctness":[140],"outsourced":[142],"overwhelming":[146],"probability":[147],"constant":[149],"computational":[150,156],"complexity.":[151],"The":[152],"security":[153],"analysis":[154],"costs":[157],"demonstrate":[158],"that":[159,195],"VRLBP":[160,182,196],"reduce":[162],"computation":[164],"overhead":[165],"around":[167],"30%":[168],"original":[170,204],"privacy-preserving":[175],"manner.":[176],"To":[177],"exhibit":[178],"practical":[180],"utility,":[181],"is":[183],"implemented":[184],"deepfake":[186],"detection":[187],"five":[189],"public":[190],"datasets.":[191],"Extensive":[192],"evaluations":[193],"indicate":[194],"achieves":[197],"almost":[198],"same":[200],"accuracy":[201],"as":[202],"algorithm":[206],"outperforms":[208],"state-of-the-art":[210],"protocols.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
