{"id":"https://openalex.org/W4400307485","doi":"https://doi.org/10.1186/s42400-024-00213-z","title":"A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud","display_name":"A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud","publication_year":2024,"publication_date":"2024-07-03","ids":{"openalex":"https://openalex.org/W4400307485","doi":"https://doi.org/10.1186/s42400-024-00213-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00213-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00213-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00213-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00213-z","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101024648","display_name":"Miao Tian","orcid":"https://orcid.org/0009-0007-6878-0460"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Miao Tian","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734706","display_name":"Yongming Zhang","orcid":"https://orcid.org/0000-0002-7312-2397"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongming Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057787077","display_name":"Xiangli Xiao","orcid":"https://orcid.org/0000-0002-3250-0603"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangli Xiao","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037182288","display_name":"Wenying Wen","orcid":"https://orcid.org/0000-0002-3098-4640"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenying Wen","raw_affiliation_strings":["School of Information Management, Jiangxi University of Finance and Economics, Nanchang, 330032, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Management, Jiangxi University of Finance and Economics, Nanchang, 330032, China","institution_ids":["https://openalex.org/I59649739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101024648"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":1.8538,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8659023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8036022186279297},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7035572528839111},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6651960611343384},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.6222891807556152},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6168713569641113},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.5817793011665344},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5065120458602905},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.437473326921463},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.42795276641845703},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3814823627471924},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3241727352142334},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.23128241300582886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21090912818908691},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08831027150154114},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07577002048492432}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036022186279297},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7035572528839111},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6651960611343384},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.6222891807556152},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6168713569641113},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.5817793011665344},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5065120458602905},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.437473326921463},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.42795276641845703},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3814823627471924},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3241727352142334},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.23128241300582886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21090912818908691},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08831027150154114},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07577002048492432},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00213-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00213-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00213-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:63c2652c7fc94f85850775434d0387e1","is_oa":false,"landing_page_url":"https://doaj.org/article/63c2652c7fc94f85850775434d0387e1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-12 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00213-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00213-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00213-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400307485.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1576347849","https://openalex.org/W1973948296","https://openalex.org/W1988374166","https://openalex.org/W1993988355","https://openalex.org/W1999314592","https://openalex.org/W1999551046","https://openalex.org/W2005756274","https://openalex.org/W2007470995","https://openalex.org/W2014143000","https://openalex.org/W2076623138","https://openalex.org/W2099104351","https://openalex.org/W2109868644","https://openalex.org/W2135074106","https://openalex.org/W2434696942","https://openalex.org/W2462806717","https://openalex.org/W2469486851","https://openalex.org/W2525788160","https://openalex.org/W2542538106","https://openalex.org/W2588718098","https://openalex.org/W2766749922","https://openalex.org/W2787759290","https://openalex.org/W2912322911","https://openalex.org/W2914113834","https://openalex.org/W2916628276","https://openalex.org/W2933964678","https://openalex.org/W2941360959","https://openalex.org/W2944405025","https://openalex.org/W2960243139","https://openalex.org/W3022522375","https://openalex.org/W3094474718","https://openalex.org/W3104962257","https://openalex.org/W3127076115","https://openalex.org/W3154870941","https://openalex.org/W3155554899","https://openalex.org/W3201597800","https://openalex.org/W4206266914","https://openalex.org/W4210879831","https://openalex.org/W4210930647","https://openalex.org/W4220660149","https://openalex.org/W4221080850","https://openalex.org/W4229052815","https://openalex.org/W4281612743","https://openalex.org/W4308641861"],"related_works":["https://openalex.org/W2944823289","https://openalex.org/W2003209439","https://openalex.org/W4321854979","https://openalex.org/W3037018281","https://openalex.org/W2358319515","https://openalex.org/W2972592048","https://openalex.org/W4312214821","https://openalex.org/W4361862506","https://openalex.org/W2497626292","https://openalex.org/W2390344072"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,5,19,25,44,54,62,65,68,104,128,143,147,153,166,169],"popularity":[3],"of":[4,35,41,43,64,146,155,168],"media":[6,20,47],"cloud":[7,21],"computing":[8],"industry,":[9],"individuals":[10],"and":[11,16,103,135,152,172,178,185],"organizations":[12],"outsource":[13],"image":[14,45,66,73,101,106,111,129,170,173],"computation":[15],"storage":[17,26],"to":[18,23,53,109,122,131],"server":[22],"reduce":[24],"burden.":[27],"Media":[28],"images":[29,48],"usually":[30],"contain":[31],"a":[32,93,114,181],"large":[33],"amount":[34],"private":[36],"information.":[37],"To":[38],"prevent":[39],"disclosure":[40],"privacy":[42],"owners,":[46],"are":[49],"encrypted":[50,105],"before":[51],"uploading":[52],"server.":[55],"However,":[56],"this":[57,89,156],"operation":[58],"will":[59],"greatly":[60],"limit":[61],"utilization":[63],"for":[67,99,127],"user,":[69],"such":[70],"as":[71],"content-based":[72],"retrieval.":[74],"We":[75],"propose":[76],"an":[77,124],"efficient":[78],"similarity":[79,100],"query":[80],"algorithm":[81],"with":[82],"access":[83],"control":[84],"based":[85],"on":[86],"Bkd-tree":[87,119],"in":[88,91],"paper,":[90],"which":[92],"searchable":[94],"encryption":[95],"scheme":[96,149,157],"is":[97,107,120,150,158],"designed":[98],"retrieval,":[102],"used":[108],"extract":[110],"features":[112,130,174],"by":[113,160],"pre-trained":[115],"CNN":[116],"model.":[117],"The":[118,162],"utilized":[121],"generate":[123],"index":[125],"tree":[126],"speed":[132],"up":[133],"retrieval":[134,183,187],"make":[136],"it":[137,179],"faster":[138],"than":[139],"linear":[140],"indexing.":[141],"Finally,":[142],"security":[144,167],"performances":[145],"proposed":[148],"analyzed":[151],"performance":[154],"evaluated":[159],"experiments.":[161],"results":[163],"show":[164],"that":[165],"content":[171],"can":[175],"be":[176],"ensured,":[177],"has":[180],"shorter":[182],"time":[184],"higher":[186],"efficiency.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
