P. Weinzaepfel, H. Jégou, and P. Perez, Reconstructing an image from its local descriptors, CVPR 2011, pp.337-344, 2011.
DOI : 10.1109/CVPR.2011.5995616

URL : https://hal.archives-ouvertes.fr/inria-00566718

L. Weng, L. Amsaleg, A. Morton, and S. Marchand-maillet, A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval, IEEE Transactions on Information Forensics and Security, vol.10, issue.1, pp.152-167, 2015.
DOI : 10.1109/TIFS.2014.2365998

URL : https://hal.archives-ouvertes.fr/hal-01083328

S. Rane and P. Boufounos, Privacy-preserving nearest neighbor methods: comparing signals without revealing them, IEEE Signal Processing Magazine, vol.30, issue.2, pp.18-28, 2013.
DOI : 10.1109/MSP.2012.2230221

R. Lagendijk, Z. Erkin, and M. Barni, Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Processing Magazine, vol.30, issue.1, pp.82-105, 2013.
DOI : 10.1109/MSP.2012.2219653

Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi et al., Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing, EURASIP Journal on Information Security, p.20, 2007.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in cryptology?EUROCRYPT'99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

M. Naor and B. Pinkas, Efficient oblivious transfer protocols, Proc. of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.448-457, 2001.

A. C. Yao, How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986.
DOI : 10.1109/SFCS.1986.25

J. Bringer, H. Chabanne, and A. Patey, Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends, IEEE Signal Processing Magazine, vol.30, issue.2, pp.42-52, 2013.
DOI : 10.1109/MSP.2012.2230218

Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk et al., Privacy-Preserving Face Recognition, Proc. of 9th International Symposium on Privacy Enhancing Technologies (PET), pp.235-253, 2009.
DOI : 10.1007/978-3-642-03168-7_14

A. Sadeghi, T. Schneider, and I. Wehrenberg, Efficient privacypreserving face recognition, Proc. of 12th International Conference on Information Security and Cryptology, pp.229-244, 2009.

M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, pp.239-254, 2010.
DOI : 10.1109/SP.2010.39

P. Sabbu, U. Ganugula, S. Kannan, and B. Bezawada, An Oblivious Image Retrieval Protocol, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, pp.349-354, 2011.
DOI : 10.1109/WAINA.2011.128

W. B. Johnson and J. Lindenstrauss, Extensions of Lipschitz mappings into a Hilbert space in Conference in modern analysis and probability, ser. Contemp. Math. Providence, RI: Amer, pp.189-206, 1982.

W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, Enabling search over encrypted multimedia databases, Media Forensics and Security, 2009.
DOI : 10.1117/12.806980

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.7838

S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, Conception and limits of robust perceptual hashing: towards side information assisted hash functions, Media Forensics and Security, 2009.
DOI : 10.1117/12.805919

G. Fanti, M. Finiasz, and K. Ramchandran, One-Way Private Media Search on Public Databases: The Role of Signal Processing, IEEE Signal Processing Magazine, vol.30, issue.2, pp.53-61, 2013.
DOI : 10.1109/MSP.2012.2229783

A. Andoni and P. Indyk, Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008.
DOI : 10.1145/1327452.1327494

P. Boufounos and S. Rane, Secure binary embeddings for privacy preserving nearest neighbors, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011.
DOI : 10.1109/WIFS.2011.6123149

M. Diephuis, S. Voloshynovskiy, O. Koval, and F. Beekhof, Robust message-privacy preserving image copy detection for cloud-based systems, Proc. of International Workshop on Content-based Multimedia Indexing (CBMI), 2012.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.222-233, 2014.
DOI : 10.1109/TPDS.2013.45

G. Danezis and S. Gürses, A critical review of 10 years of privacy technology, Proc. of 4th Surveillance & Society Conference, 2010.

L. Liu and L. Wang, What has my classifier learned? Visualizing the classification rules of bag-of-feature model by support region detection, Proc. of IEEE International Conference on Computer Vision and Pattern Recognition (CVPR), 2012.

A. Oliva and A. Torralba, Modeling the shape of the scene: A holistic representation of the spatial envelope, International Journal of Computer Vision, vol.42, issue.3, pp.145-175, 2001.
DOI : 10.1023/A:1011139631724

D. G. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, 2004.
DOI : 10.1023/B:VISI.0000029664.99615.94

F. Khelifi, J. Jiang, H. Ozer, B. Sankur, N. Memon et al., Perceptual Image Hashing Based on Virtual Watermark Detection, Perceptual audio hashing functions, pp.981-994, 2005.
DOI : 10.1109/TIP.2009.2038637

A. Varna and M. Wu, Modeling and Analysis of Correlated Binary Fingerprints for Content Identification, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1146-1159, 2011.
DOI : 10.1109/TIFS.2011.2152394

P. Cano, E. Batlle, T. Kalker, and J. Haitsma, A Review of Audio Fingerprinting, Journal of VLSI signal processing systems for signal, image and video technology, vol.33, issue.3, pp.271-284, 2005.
DOI : 10.1007/s11265-005-4151-3

T. Furon, H. Jégou, L. Amsaleg, and B. Mathon, Fast and secure similarity search in high dimensional space, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), pp.73-78, 2013.
DOI : 10.1109/WIFS.2013.6707797

URL : https://hal.archives-ouvertes.fr/hal-00857570

F. Willems, T. Kalker, S. Baggen, and J. Linnartz, On the capacity of a biometrical identification system, IEEE International Symposium on Information Theory, 2003. Proceedings., 2003.
DOI : 10.1109/ISIT.2003.1228096

S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun, Robust perceptual hashing as classification problem: decision-theoretic and practical considerations, 2007 IEEE 9th Workshop on Multimedia Signal Processing, pp.345-348, 2007.
DOI : 10.1109/MMSP.2007.4412887

P. Moulin, Statistical modeling and analysis of content identification, 2010 Information Theory and Applications Workshop (ITA), pp.1-5, 2010.
DOI : 10.1109/ITA.2010.5454105

L. Weng, I. Jhuo, M. Shi, M. Sun, W. Cheng et al., Supervised Multi-scale Locality Sensitive Hashing, Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, ICMR '15, 2015.
DOI : 10.1145/2671188.2749291

URL : https://hal.archives-ouvertes.fr/hal-01141225

J. Sivic and A. Zisserman, Video Google: a text retrieval approach to object matching in videos, Proceedings Ninth IEEE International Conference on Computer Vision, 2003.
DOI : 10.1109/ICCV.2003.1238663

H. Jégou, M. Douze, and C. Schmid, Product Quantization for Nearest Neighbor Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.33, issue.1, 2011.
DOI : 10.1109/TPAMI.2010.57

I. You and K. Yim, Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.297-300, 2010.
DOI : 10.1109/BWCCA.2010.85

W. Stallings, C. , and N. Security, Similarity estimation techniques from rounding algorithms, Proc. of 34th annual ACM Symposium on Theory of Computing (STOC), pp.380-388, 2002.

Y. Mao, M. Wu, S. Govindarajan, P. Gasti, and K. Balagani, Unicity Distance of Robust Image Hashing, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.462-467, 2007.
DOI : 10.1109/TIFS.2007.902260