Reconstructing an image from its local descriptors, CVPR 2011, pp.337-344, 2011. ,
DOI : 10.1109/CVPR.2011.5995616
URL : https://hal.archives-ouvertes.fr/inria-00566718
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval, IEEE Transactions on Information Forensics and Security, vol.10, issue.1, pp.152-167, 2015. ,
DOI : 10.1109/TIFS.2014.2365998
URL : https://hal.archives-ouvertes.fr/hal-01083328
Privacy-preserving nearest neighbor methods: comparing signals without revealing them, IEEE Signal Processing Magazine, vol.30, issue.2, pp.18-28, 2013. ,
DOI : 10.1109/MSP.2012.2230221
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Processing Magazine, vol.30, issue.1, pp.82-105, 2013. ,
DOI : 10.1109/MSP.2012.2219653
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing, EURASIP Journal on Information Security, p.20, 2007. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in cryptology?EUROCRYPT'99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Efficient oblivious transfer protocols, Proc. of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.448-457, 2001. ,
How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986. ,
DOI : 10.1109/SFCS.1986.25
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends, IEEE Signal Processing Magazine, vol.30, issue.2, pp.42-52, 2013. ,
DOI : 10.1109/MSP.2012.2230218
Privacy-Preserving Face Recognition, Proc. of 9th International Symposium on Privacy Enhancing Technologies (PET), pp.235-253, 2009. ,
DOI : 10.1007/978-3-642-03168-7_14
Efficient privacypreserving face recognition, Proc. of 12th International Conference on Information Security and Cryptology, pp.229-244, 2009. ,
SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, pp.239-254, 2010. ,
DOI : 10.1109/SP.2010.39
An Oblivious Image Retrieval Protocol, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, pp.349-354, 2011. ,
DOI : 10.1109/WAINA.2011.128
Extensions of Lipschitz mappings into a Hilbert space in Conference in modern analysis and probability, ser. Contemp. Math. Providence, RI: Amer, pp.189-206, 1982. ,
Enabling search over encrypted multimedia databases, Media Forensics and Security, 2009. ,
DOI : 10.1117/12.806980
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.7838
Conception and limits of robust perceptual hashing: towards side information assisted hash functions, Media Forensics and Security, 2009. ,
DOI : 10.1117/12.805919
One-Way Private Media Search on Public Databases: The Role of Signal Processing, IEEE Signal Processing Magazine, vol.30, issue.2, pp.53-61, 2013. ,
DOI : 10.1109/MSP.2012.2229783
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008. ,
DOI : 10.1145/1327452.1327494
Secure binary embeddings for privacy preserving nearest neighbors, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123149
Robust message-privacy preserving image copy detection for cloud-based systems, Proc. of International Workshop on Content-based Multimedia Indexing (CBMI), 2012. ,
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.222-233, 2014. ,
DOI : 10.1109/TPDS.2013.45
A critical review of 10 years of privacy technology, Proc. of 4th Surveillance & Society Conference, 2010. ,
What has my classifier learned? Visualizing the classification rules of bag-of-feature model by support region detection, Proc. of IEEE International Conference on Computer Vision and Pattern Recognition (CVPR), 2012. ,
Modeling the shape of the scene: A holistic representation of the spatial envelope, International Journal of Computer Vision, vol.42, issue.3, pp.145-175, 2001. ,
DOI : 10.1023/A:1011139631724
Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, 2004. ,
DOI : 10.1023/B:VISI.0000029664.99615.94
Perceptual Image Hashing Based on Virtual Watermark Detection, Perceptual audio hashing functions, pp.981-994, 2005. ,
DOI : 10.1109/TIP.2009.2038637
Modeling and Analysis of Correlated Binary Fingerprints for Content Identification, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1146-1159, 2011. ,
DOI : 10.1109/TIFS.2011.2152394
A Review of Audio Fingerprinting, Journal of VLSI signal processing systems for signal, image and video technology, vol.33, issue.3, pp.271-284, 2005. ,
DOI : 10.1007/s11265-005-4151-3
Fast and secure similarity search in high dimensional space, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), pp.73-78, 2013. ,
DOI : 10.1109/WIFS.2013.6707797
URL : https://hal.archives-ouvertes.fr/hal-00857570
On the capacity of a biometrical identification system, IEEE International Symposium on Information Theory, 2003. Proceedings., 2003. ,
DOI : 10.1109/ISIT.2003.1228096
Robust perceptual hashing as classification problem: decision-theoretic and practical considerations, 2007 IEEE 9th Workshop on Multimedia Signal Processing, pp.345-348, 2007. ,
DOI : 10.1109/MMSP.2007.4412887
Statistical modeling and analysis of content identification, 2010 Information Theory and Applications Workshop (ITA), pp.1-5, 2010. ,
DOI : 10.1109/ITA.2010.5454105
Supervised Multi-scale Locality Sensitive Hashing, Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, ICMR '15, 2015. ,
DOI : 10.1145/2671188.2749291
URL : https://hal.archives-ouvertes.fr/hal-01141225
Video Google: a text retrieval approach to object matching in videos, Proceedings Ninth IEEE International Conference on Computer Vision, 2003. ,
DOI : 10.1109/ICCV.2003.1238663
Product Quantization for Nearest Neighbor Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.33, issue.1, 2011. ,
DOI : 10.1109/TPAMI.2010.57
Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp.297-300, 2010. ,
DOI : 10.1109/BWCCA.2010.85
Similarity estimation techniques from rounding algorithms, Proc. of 34th annual ACM Symposium on Theory of Computing (STOC), pp.380-388, 2002. ,
Unicity Distance of Robust Image Hashing, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.462-467, 2007. ,
DOI : 10.1109/TIFS.2007.902260