. Barni, Inspiring new research in the field of signal processing in the encrypted domain, IEEE Signal Processing Magazine, vol.30, issue.2, p.129, 2013.

. Barreno, Can machine learning be secure?, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, p.131, 2006.
DOI : 10.1145/1128817.1128824

. Barreno, The security of machine learning, Machine Learning, p.131, 2010.
DOI : 10.1007/s10994-010-5188-5

. Bartolini, . Ciaccia, I. Bartolini, and P. Ciaccia, Integrating semantic and visual facets for browsing digital photo collections, Proceedings of the Italian Symposium on Advanced Database Systems, p.117, 2009.

. Beekhof, Content authentication and identification under informed attacks, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), p.128, 2012.
DOI : 10.1109/WIFS.2012.6412638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.9014

J. L. Bentley, Multidimensional binary search trees used for associative searching, Communications of the ACM, vol.18, issue.9, p.6, 1975.
DOI : 10.1145/361002.361007

S. Berrani, Recherche approximative de plus proches voisins avec contrôle probabiliste de la précision ; application à la recherche d'images par le contenu, p.6, 2004.

. Berrani, Recherche par similarité dans les bases de données multidimensionnelles : panorama des techniques d'indexation. RSTI?Ingénierie des systèmes d'information, p.6, 2002.
DOI : 10.3166/isi.7.5-6.9-44

. Beyer, When Is ???Nearest Neighbor??? Meaningful?, Proceedings of the International Conference on Database Theory, pp.6-140, 1999.
DOI : 10.1007/3-540-49257-7_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.1422

. Beygelzimer, Cover trees for nearest neighbor, Proceedings of the 23rd international conference on Machine learning , ICML '06, p.140, 2006.
DOI : 10.1145/1143844.1143857

K. Bhatt, C. A. Bhatt, and M. S. Kankanhalli, Multimedia data mining: state of the art and challenges, Multimedia Tools and Applications, vol.17, issue.5, p.122, 2011.
DOI : 10.1007/s11042-010-0645-5

. Biggio, Poisoning attacks against support vector machines, Proceedings of the International Conference on Machine Learning, pp.131-134, 2012.

. Biggio, Is data clustering in adversarial settings secure?, Proceedings of the 2013 ACM workshop on Artificial intelligence and security, AISec '13, pp.131-137, 2013.
DOI : 10.1145/2517312.2517321

. Böhm, Searching in highdimensional spaces: Index structures for improving the performance of multimedia databases, ACM Computing Surveys, vol.33, issue.3, p.6, 2001.

. Bohme, . Kirchner, R. Bohme, and M. Kirchner, Counter-Forensics: Attacking Image Forensics, Digital Image Forensics, p.126, 2013.
DOI : 10.1007/978-1-4614-0757-7_12

. Boldi, . Vigna, P. Boldi, and S. Vigna, The webgraph framework I, Proceedings of the 13th conference on World Wide Web , WWW '04, p.114, 2004.
DOI : 10.1145/988672.988752

. Bolze, Grid'5000: A Large Scale And Highly Reconfigurable Experimental Grid Testbed, International Journal of High Performance Computing Applications, vol.20, issue.4, p.95, 2006.
DOI : 10.1177/1094342006070078

URL : https://hal.archives-ouvertes.fr/hal-00684943

. Bouganim, uFLIP: Understanding flash io patterns, Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, p.75, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00624058

. Bowyer, A survey of iris biometrics research, Handbook of Iris Recognition, pp.2008-2010, 2013.

. Bringer, Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends, IEEE Signal Processing Magazine, vol.30, issue.2, p.128, 2013.
DOI : 10.1109/MSP.2012.2230218

. Bu, HaLoop, Proceedings of the VLDB Endowment, p.104, 2010.
DOI : 10.14778/1920841.1920881

J. Buhler, Efficient large-scale sequence comparison by locality-sensitive hashing, Bioinformatics, vol.17, issue.5, p.32, 2001.
DOI : 10.1093/bioinformatics/17.5.419

J. Burred, Genetic motif discovery applied to audio analysis, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), p.140, 2012.
DOI : 10.1109/ICASSP.2012.6287891

. Caldelli, On the effectiveness of local warping against SIFT-based copy-move detection, 2012 5th International Symposium on Communications, Control and Signal Processing, p.126, 2012.
DOI : 10.1109/ISCCSP.2012.6217846

E. Y. Chang, Foundations of Large-Scale Multimedia Information Management and Retrieval: Mathematics of Perception, p.131, 2011.
DOI : 10.1007/978-3-642-20429-6

. Cheng, Authenticating multidimensional query results in data publishing, Data and Applications Security XX, p.136, 2006.

. Chierichetti, Finding near neighbors through cluster pruning, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.63-79, 2007.
DOI : 10.1145/1265530.1265545

. Chor, Private information retrieval, Proceedings of the IEEE Symposium on the Foundations of Computer Science, p.132, 1995.

. Christlein, An Evaluation of Popular Copy-Move Forgery Detection Approaches, IEEE Transactions on Information Forensics and Security, vol.7, issue.6, p.126, 2012.
DOI : 10.1109/TIFS.2012.2218597

O. Chum and J. Matas, Optimal Randomized RANSAC, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.30, issue.8, p.16, 2008.
DOI : 10.1109/TPAMI.2007.70787

M. Connelly, R. Connelly, and R. Mcneill, The Multidimensional Manager . Cognos, p.116, 1999.

S. Conway, J. H. Conway, and N. J. Sloane, Fast quantizing and decoding and algorithms for lattice quantizers and codes, IEEE Transactions on Information Theory, vol.28, issue.2, p.53, 1982.
DOI : 10.1109/TIT.1982.1056484

S. Conway, J. H. Conway, and N. J. Sloane, Voronoi regions of lattices, second moments of polytopes, and quantization, IEEE Transactions on Information Theory, vol.28, issue.2, p.53, 1982.
DOI : 10.1109/TIT.1982.1056483

C. , S. Conway, J. H. Sloane, and N. J. , Sphere-packings, lattices, and groups, p.53, 1987.

. Datar, Localitysensitive hashing scheme based on p-stable distributions, Proceedings of the ACM Symposium on Computational Geometry, pp.29-65, 2004.

. Datta, Image retrieval, ACM Computing Surveys, vol.40, issue.2, 2008.
DOI : 10.1145/1348246.1348248

O. De, Searching for near-duplicate video sequences from a scalable sequence aligner, Proceedings of the IEEE International Symposium on Multimedia, p.140, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00906327

G. Dean, J. Dean, and S. Ghemawat, MapReduce, Communications of the ACM, vol.51, issue.1, pp.92-93, 2008.
DOI : 10.1145/1327452.1327492

. Delvinioti, Image retrieval with reciprocal and shared nearest neighbors, International Conference on Computer Vision Theory and Applications, p.110, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00907481

. Diao, Faceted search and browsing of audio content on spoken web, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, p.117, 2010.
DOI : 10.1145/1871437.1871568

. Do, Challenging the security of Content-Based Image Retrieval systems, 2010 IEEE International Workshop on Multimedia Signal Processing, p.130, 2010.
DOI : 10.1109/MMSP.2010.5661993

URL : https://hal.archives-ouvertes.fr/inria-00505846

. Do, Deluding image recognition in SIFT-based CBIR systems Understanding the security and robustness of SIFT, Proceedings of the ACM International Conference on Multimedia, Workshop on Multimedia in Forensics, Security and Intelligence Proceedings of the ACM International Conference on Multimedia, pp.130-130, 2010.

. Do, Security-oriented picture-in-picture visual modifications, Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, ICMR '12, pp.130-137, 2012.
DOI : 10.1145/2324796.2324813

URL : https://hal.archives-ouvertes.fr/hal-00764431

. Do, Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), p.130, 2012.
DOI : 10.1109/ICASSP.2012.6288254

. Dong, Efficient k-nearest neighbor graph construction for generic similarity measures, Proceedings of the 20th international conference on World wide web, WWW '11, p.113, 2011.
DOI : 10.1145/1963405.1963487

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9237

. Douze, Evaluation of GIST descriptors for web-scale image search, Proceeding of the ACM International Conference on Image and Video Retrieval, CIVR '09, p.65, 2009.
DOI : 10.1145/1646396.1646421

URL : https://hal.archives-ouvertes.fr/inria-00394212

. Ekanayake, Twister, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC '10, p.104, 2010.
DOI : 10.1145/1851476.1851593

. Engle, Shark, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, p.9, 2012.
DOI : 10.1145/2213836.2213934

. Ergün, Spot-checkers, Journal of Computer and System Sciences, issue.3, pp.60-136, 2000.

. Erkin, Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing, EURASIP Journal on Information Security, p.129, 2007.

. Erkin, Privacy-Preserving Face Recognition, Proceedings of the International Symposium on Privacy Enhancing Technologies, pp.128-129, 2009.
DOI : 10.1007/978-3-642-03168-7_14

. Eskevich, Multimedia information seeking through search and hyperlinking, Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, ICMR '13, p.122, 2013.
DOI : 10.1145/2461466.2461511

URL : https://hal.archives-ouvertes.fr/hal-00867090

. Fagin, Efficient similarity search and classification via rank aggregation, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.34-35, 2003.
DOI : 10.1145/872757.872795

. Fanti, One-Way Private Media Search on Public Databases: The Role of Signal Processing, IEEE Signal Processing Magazine, vol.30, issue.2, p.132, 2013.
DOI : 10.1109/MSP.2012.2229783

. Feigenbaum, Testing and Spot-Checking of Data Streams, Algorithmica, vol.34, issue.1, p.136, 2002.
DOI : 10.1007/s00453-002-0959-4

B. Fischler, M. A. Fischler, and R. C. Bolles, Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography, Communications of the ACM, vol.24, issue.6, pp.16-109, 1981.

. Fraundorfer, A Binning Scheme for Fast Hard Drive Based Image Search, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.63-64, 2007.
DOI : 10.1109/CVPR.2007.383174

. Furon, Fast and secure similarity search in high dimensional space, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), p.137, 2013.
DOI : 10.1109/WIFS.2013.6707797

URL : https://hal.archives-ouvertes.fr/hal-00857570

. Gal, . Toledo, E. Gal, and S. Toledo, Algorithms and data structures for flash memories, ACM Computing Surveys, vol.37, issue.2, p.64, 2005.
DOI : 10.1145/1089733.1089735

. Ghemawat, The google file system, Proceedings of the ACM Symposium on Operating Systems Principles, p.93, 2003.

. Gionis, Similarity search in high dimensions via hashing, Proceedings of the International Conference on Very Large Data Bases, pp.27-60, 1999.

. Gloe, Can we trust digital image forensics?, Proceedings of the 15th international conference on Multimedia , MULTIMEDIA '07, p.126, 2007.
DOI : 10.1145/1291233.1291252

. Gray, The Recovery Manager of the System R Database Manager, ACM Computing Surveys, vol.13, issue.2, p.42, 1981.
DOI : 10.1145/356842.356847

. Guha, Privad: Practical privacy in online advertising, Proceedings of the USENIX Conference on Networked Systems Design and Implementation, p.136, 2011.

A. Guttman, R-trees: A dynamic index structure for spatial searching, Proceedings of the ACM International Conference on Management of Data, p.6, 1984.

G. Þ. Guðmundsson, Parallelism and Distribution for Very Large Scale Content Based Image Retrieval, pp.78-105, 2013.

. Guðmundsson, A large-scale performance study of cluster-based high-dimensional indexing, Proceedings of the international workshop on Very-large-scale multimedia corpus, mining and retrieval, VLS-MCMR '10, p.72, 2010.
DOI : 10.1145/1878137.1878145

. Guðmundsson, Impact of Storage Technology on the Efficiency of Cluster-Based High-Dimensional Index Creation, Proceedings of the International Conference on Database Systems for Advanced Applications, p.75, 2012.
DOI : 10.1007/978-3-642-29023-7_6

. Hamzaoui, Object-based visual query suggestion, Multimedia Tools and Applications, p.110, 2014.
DOI : 10.1007/s11042-012-1340-5

URL : https://hal.archives-ouvertes.fr/hal-00806635

J. Harðarson, K. Harðarson, and B. Þ. Jónsson, Breaking out of the shoebox: Towards having fun with digital images, Proceedings of the International Workshop on Computer Vision Meets Databases, p.117, 2007.

C. Herley, ARGOS: automatically extracting repeating objects from multimedia streams, IEEE Transactions on Multimedia, vol.8, issue.1, p.139, 2006.
DOI : 10.1109/TMM.2005.861286

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.4065

M. E. Houle, The relevant-set correlation model for data clustering, Statistical Analysis and Data Mining, vol.1, issue.3, pp.110-111, 2008.

. Houle, Can Shared-Neighbor Distances Defeat the Curse of Dimensionality?, Proceedings of the International Conference on Scientific and Statistical Database Management, pp.110-111, 2010.
DOI : 10.1007/978-3-642-13818-8_34

. Houle, Generalized Expansion Dimension, 2012 IEEE 12th International Conference on Data Mining Workshops, p.140, 2012.
DOI : 10.1109/ICDMW.2012.94

. Houle, Dimensional Testing for Multi-step Similarity Search, 2012 IEEE 12th International Conference on Data Mining, p.140, 2012.
DOI : 10.1109/ICDM.2012.91

. Hsu, Secure and robust SIFT, Proceedings of the seventeen ACM international conference on Multimedia, MM '09, pp.128-130, 2009.
DOI : 10.1145/1631272.1631376

. Hsu, Secure and robust sift with resistance to chosen-plaintext attack, 2010 IEEE International Conference on Image Processing, p.128, 2010.
DOI : 10.1109/ICIP.2010.5650284

. Huang, Adversarial machine learning, Proceedings of the 4th ACM workshop on Security and artificial intelligence, AISec '11, p.131, 2011.
DOI : 10.1145/2046684.2046692

. Huang, Efficient privacypreserving biometric identification, Proceedings of the Network and Distributed System Security Symposium, p.129, 2011.

. Ide, Topic Threading for Structuring a Large-Scale News Video Archive, Proceedings of the ACM International Conference on Image and Video Retrieval, p.139, 2004.
DOI : 10.1007/978-3-540-27814-6_18

M. Indyk, P. Indyk, and R. Motwani, Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, p.30, 1998.
DOI : 10.1145/276698.276876

. Isard, Dryad: distributed data-parallel programs from sequential building blocks, SIGOPS Operating System Review, vol.9, issue.3, pp.41-92, 2007.

F. Itakura, Minimum prediction residual principle applied to speech recognition, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, p.139, 1975.

. Jain, An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, p.128, 2004.
DOI : 10.1109/TCSVT.2003.818349

URL : http://biometrics.cse.msu.edu/Publications/GeneralBiometrics/JainRossPrabhakar_BiometricIntro_CSVT04.pdf

A. K. Jain and K. Nandakumar, Biometric Authentication: System Security and User Privacy, Computer, vol.45, issue.11, pp.45-128, 2012.
DOI : 10.1109/MC.2012.364

. Jégou, A contextual dissimilarity measure for accurate and efficient image search, 2007 IEEE Conference on Computer Vision and Pattern Recognition, p.109, 2007.
DOI : 10.1109/CVPR.2007.382970

. Jégou, Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search, Proceedings of the European Conference on Computer Vision, p.113, 2008.
DOI : 10.1007/978-3-540-88682-2_24

. Jégou, Query adaptative locality sensitive hashing, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, p.60, 2008.
DOI : 10.1109/ICASSP.2008.4517737

. Jégou, Aggregating local descriptors into a compact image representation, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp.8-65, 2010.
DOI : 10.1109/CVPR.2010.5540039

. Jégou, Improving Bag-of-Features for Large Scale Image Search, International Journal of Computer Vision, vol.42, issue.3, pp.64-68, 2010.
DOI : 10.1007/s11263-009-0285-2

. Jégou, Product Quantization for Nearest Neighbor Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.33, issue.1, pp.7-79, 2011.
DOI : 10.1109/TPAMI.2010.57

. Jégou, Aggregating Local Image Descriptors into Compact Codes, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.34, issue.9, pp.35-79, 2012.
DOI : 10.1109/TPAMI.2011.235

K. Ramchandran, Dither-based secure image hashing using distributed coding, Proceedings of the IEEE International Conference on Image Processing, p.135, 2003.

J. , B. Joly, A. Buisson, and O. , A posteriori multi-probe locality sensitive hashing, Proceedings of the ACM International Conference on Multimedia, pp.33-79, 2008.

. Jónsson, M 3 + P 3 + O 3 = multi-D photo browsing, Proceedings of the International Conference on MultiMedia Modeling, p.117, 2014.

. Karger, D. R. Karger, and M. Ruhl, Finding nearest neighbors in growth-restricted metrics, Proceedings of the thiry-fourth annual ACM symposium on Theory of computing , STOC '02, p.140, 2002.
DOI : 10.1145/509907.510013

R. Kay, Exploring the use of video podcasts in education: A comprehensive review of the literature, Computers in Human Behavior, vol.28, issue.3, p.122, 2012.
DOI : 10.1016/j.chb.2012.01.011

R. Keogh, E. Keogh, and C. Ratanamahatana, Exact indexing of dynamic time warping, Knowledge and Information Systems, vol.7, issue.3, p.139, 2005.

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol.9, p.127, 1883.

. Kozat, Robust perceptual image hashing via matrix invariants, 2004 International Conference on Image Processing, 2004. ICIP '04., p.135, 2004.
DOI : 10.1109/ICIP.2004.1421855

. Lagendijk, Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Processing Magazine, vol.30, issue.1, pp.129-131, 2013.
DOI : 10.1109/MSP.2012.2219653

. Laskov, . Lippmann, P. Laskov, and R. Lippmann, Machine learning in adversarial environments, Machine Learning, p.131, 2010.
DOI : 10.1007/s10994-010-5207-6

. Law-to, Video copy detection, Proceedings of the 6th ACM international conference on Image and video retrieval, CIVR '07, p.124, 2007.
DOI : 10.1145/1282280.1282336

. Law-to, VoxaleadNews, Proceedings of the seventeen ACM international conference on Multimedia, MM '09, p.122, 2010.
DOI : 10.1145/1631272.1631527

URL : https://hal.archives-ouvertes.fr/inria-00555846

. Lee, A case for flash memory ssd in enterprise database applications, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, p.64, 2008.
DOI : 10.1145/1376616.1376723

. Lejsek, Efficient and effective image copyright enforcement, Actes des Journées sur les bases de données avancées, pp.35-124, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00175253

. Lejsek, Scalability of local image descriptors, Proceedings of the 14th annual ACM international conference on Multimedia , MULTIMEDIA '06, pp.35-48, 2006.
DOI : 10.1145/1180639.1180760

URL : https://hal.archives-ouvertes.fr/inria-00175234

. Lejsek, Blazingly fast image copyright enforcement, Proceedings of the 14th annual ACM international conference on Multimedia , MULTIMEDIA '06, pp.38-124, 2006.
DOI : 10.1145/1180639.1180739

URL : https://hal.archives-ouvertes.fr/inria-00175247

. Lejsek, NV-Tree: An Efficient Disk-Based Index for Approximate Search in Very Large High-Dimensional Collections, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.31, issue.5, pp.33-39, 2009.
DOI : 10.1109/TPAMI.2008.130

URL : https://hal.archives-ouvertes.fr/hal-00794359

. Lejsek, NV-Tree, Proceedings of the 1st ACM International Conference on Multimedia Retrieval, ICMR '11, pp.7-44, 2011.
DOI : 10.1145/1991996.1992050

URL : https://hal.archives-ouvertes.fr/hal-00644939

. Li, Authenticated Index Structures for Outsourced Databases, Handbook of Database Security, p.136, 2008.
DOI : 10.1007/978-0-387-48533-1_5

W. Liu, L. Liu, and L. Wang, What has my classifier learned? visualizing the classification rules of bag-of-feature model by support region detection, Proceedings of the IEEE International Conference on Computer Vision & Pattern Recognition, pp.130-131, 2012.

. Low, Distributed GraphLab, Proceedings of the VLDB Endowment, p.92, 2012.
DOI : 10.14778/2212351.2212354

D. G. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, pp.4-68, 2004.
DOI : 10.1023/B:VISI.0000029664.99615.94

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4931

. Lu, . Hsu, C. Lu, and C. Hsu, Constraint-optimized keypoint inhibition/insertion attack, Proceedings of the 20th ACM international conference on Multimedia, MM '12, p.130, 2012.
DOI : 10.1145/2393347.2393434

. Lu, Secure image retrieval through feature protection, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, p.128, 2009.
DOI : 10.1109/ICASSP.2009.4959888

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.7447

. Lv, Multiprobe LSH: efficient indexing for high-dimensional similarity search, Proceedings of the International Conference on Very Large Data Bases, pp.33-79, 2007.

. Machanavajjhala, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.136, 2007.
DOI : 10.1145/1217299.1217302

V. Malkin and R. Venkatesan, The randlet transform: application to universal perceptual hashing and image identification, Proceedings of the Allerton Conference on Communication, Control, and Computing, p.135, 2004.

. Martel, A General Model for Authenticated Data Structures, Algorithmica, vol.39, issue.1, p.136, 2004.
DOI : 10.1007/s00453-003-1076-8

. Mathon, Secure and efficient approximate nearest neighbors search, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, p.137, 2013.
DOI : 10.1145/2482513.2482539

URL : https://hal.archives-ouvertes.fr/hal-00817336

. Mejdoub, Embedded lattices tree: An efficient indexing scheme for content based retrieval on image databases, Special issue on Emerging Techniques for Multimedia Content Sharing, Search and Understanding, p.55, 2009.
DOI : 10.1016/j.jvcir.2008.12.003

. Melloni, Attacking image classification based on bag-of-visual-words, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), p.130, 2013.
DOI : 10.1109/WIFS.2013.6707802

. Merkt, Learning with videos vs. learning with print: The role of interactive features, Learning and Instruction, vol.21, issue.6, p.122, 2011.
DOI : 10.1016/j.learninstruc.2011.03.004

K. Mikolajczyk and C. Schmid, Scale & Affine Invariant Interest Point Detectors, International Journal of Computer Vision, vol.60, issue.1, p.68, 2004.
DOI : 10.1023/B:VISI.0000027790.02288.f2

URL : https://hal.archives-ouvertes.fr/inria-00548554

. Moon, Analysis of the clustering properties of the Hilbert space-filling curve, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.1, p.53, 2001.
DOI : 10.1109/69.908985

D. G. Lowe, Fast approximate nearest neighbors with automatic algorithm configuration, International Conference on Computer Vision Theory and Applications, p.65, 2009.

V. H. Nguyen and D. Lavenier, PLAST: parallel local alignment search tool for database comparison, BMC Bioinformatics, vol.10, issue.1, pp.10-140, 2009.
DOI : 10.1186/1471-2105-10-329

URL : https://hal.archives-ouvertes.fr/inria-00425301

S. Nistér, D. Nistér, and H. Stewénius, Scalable Recognition with a Vocabulary Tree, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Volume 2 (CVPR'06), pp.61-63, 2006.
DOI : 10.1109/CVPR.2006.264

T. Oliva, A. Oliva, and A. Torralba, Modeling the shape of the scene: A holistic representation of the spatial envelope, International Journal on Computer Vision, vol.42, issue.3, pp.35-68, 2001.

. Osadchy, SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, p.128, 2010.
DOI : 10.1109/SP.2010.39

. Over, An overview of the goals, tasks, data, evaluation mechanisms and metrics, p.129, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00953093

. Owen, Mahout in Action, p.104, 2011.

R. Panigrahy, Entropy based nearest neighbor search in high dimensions, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, p.33, 2006.
DOI : 10.1145/1109557.1109688

U. Park and A. K. Jain, Face Matching and Retrieval Using Soft Biometrics, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, p.128, 2010.
DOI : 10.1109/TIFS.2010.2049842

URL : http://biometrics.cse.msu.edu/Publications/Face/ParkJainFaceSoftBio_TIFS10.pdf

L. Paulevé, Réseaux géométriques pour l'indexation et la recherche en grandes dimensions, p.57, 2008.

. Paulevé, Locality sensitive hashing: A comparison of hash function types and querying mechanisms, Pattern Recognition Letters, vol.31, issue.11, pp.31-56, 2010.
DOI : 10.1016/j.patrec.2010.04.004

. Perronnin, Large-scale image retrieval with compressed Fisher vectors, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, p.109, 2010.
DOI : 10.1109/CVPR.2010.5540009

V. Pestov, On the geometry of similarity search: Dimensionality curse and concentration of measure, Information Processing Letters, vol.73, issue.1-2, p.140, 2000.
DOI : 10.1016/S0020-0190(99)00156-8

. Petitcolas, Attacks on Copyright Marking Systems, Proceedings of the International Workshop on Information Hiding, pp.18-22, 1998.
DOI : 10.1007/3-540-49380-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.4517

. Petitcolas, <title>Public automated web-based evaluation service for watermarking schemes: StirMark benchmark</title>, Security and Watermarking of Multimedia Contents III, pp.18-22, 2001.
DOI : 10.1117/12.435442

. Petrushin, V. A. Khan-]-petrushin, and L. Khan, Multimedia Data Mining and Knowledge Discovery, p.122, 2007.

. Philbin, Object retrieval with large vocabularies and fast spatial matching, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.61-113, 2007.
DOI : 10.1109/CVPR.2007.383172

. Poulisse, Unsupervised scene detection and commentator building using multi-modal chains, Multimedia Tools and Applications, p.122, 2014.
DOI : 10.1007/s11042-012-1086-0

. Pua, Real time repeated video sequence identification, Computer Vision and Image Understanding, vol.93, issue.3, pp.93-139, 2004.
DOI : 10.1016/j.cviu.2003.10.005

. Qin, Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors, CVPR 2011, pp.110-112, 2011.
DOI : 10.1109/CVPR.2011.5995373

. Rane, . Boufounos, S. Rane, and P. Boufounos, Privacy-preserving nearest neighbor methods: comparing signals without revealing them, IEEE Signal Processing Magazine, vol.30, issue.2, p.129, 2013.
DOI : 10.1109/MSP.2012.2230221

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.567.129

. Rane, Secure Biometrics: Concepts, Authentication Architectures, and Challenges, IEEE Signal Processing Magazine, vol.30, issue.5, p.128, 2013.
DOI : 10.1109/MSP.2013.2261691

URL : http://arxiv.org/abs/1305.4832

. Rathgeb, C. Uhl-]-rathgeb, and A. Uhl, A survey on biometric cryptosystems and cancelable biometrics, EURASIP Journal on Information Security, vol.2011, issue.1, p.128, 2011.
DOI : 10.1109/TIFS.2006.873653

. Robinson, Graph Databases. O'Reilly Media, p.114, 2013.

E. Rohou, Tiptop: Hardware Performance Counters for the Masses, 2012 41st International Conference on Parallel Processing Workshops, p.88, 2011.
DOI : 10.1109/ICPPW.2012.58

URL : https://hal.archives-ouvertes.fr/hal-00639173

K. Rúnarsson, A face recognition plug-in for the PhotoCube browser, p.118, 2011.

. Sadeghi, Efficient Privacy-Preserving Face Recognition, Proceedings of the International Conference on Information Security and Cryptology, pp.128-129, 2010.
DOI : 10.1007/978-3-642-14423-3_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.7646

C. Sakoe, H. Sakoe, and S. Chiba, Dynamic programming algorithm optimization for spoken word recognition, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, p.139, 1978.

H. Samet, Foundations of Multidimensional and Metric Data Structures, p.6, 2007.

. Sebe, Similarity Matching in Computer Vision and Multimedia, Computer Vision and Image Understanding, vol.110, issue.3, p.4, 2008.
DOI : 10.1016/j.cviu.2008.04.001

. Shaft, . Ramakrishnan, U. Shaft, and R. Ramakrishnan, Theory of nearest neighbors indexability, ACM Transactions on Database Systems, vol.31, issue.3, pp.31-48, 2006.
DOI : 10.1145/1166074.1166077

. Shakhnarovich, Nearest- Neighbor Methods in Learning and Vision: Theory and Practice, chapter 3, pp.29-57, 2006.

. Shashank, Private Content Based Image Retrieval, 2008 IEEE Conference on Computer Vision and Pattern Recognition, p.132, 2008.
DOI : 10.1109/CVPR.2008.4587388

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.9605

. Shestakov, Scalable high-dimensional indexing with Hadoop, 2013 11th International Workshop on Content-Based Multimedia Indexing (CBMI), pp.72-78, 2013.
DOI : 10.1109/CBMI.2013.6576584

URL : https://hal.archives-ouvertes.fr/hal-00817378

. Shvachko, The Hadoop Distributed File System, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), p.94, 2010.
DOI : 10.1109/MSST.2010.5496972

. Sigurðardottir, A case study of the quality vs. time trade-off for approximate image descriptor search, Proceedings of the IEEE International Conference on Data Engineering, Workshop on Managing Data for Emerging Multimedia Applications, p.71, 2005.

H. Sigurþórsson, PhotoCube: Multi-dimensional image browsing, p.121, 2011.

R. Sion, Query execution assurance for outsourced databases, Proceedings of the International Conference on Very Large Data Bases, p.136, 2005.

Z. Sivic, J. Sivic, and A. Zisserman, Video Google: a text retrieval approach to object matching in videos, Proceedings Ninth IEEE International Conference on Computer Vision, pp.58-61, 2003.
DOI : 10.1109/ICCV.2003.1238663

W. Snoek, C. Snoek, and M. Worring, Multimodal Video Indexing: A Review of the State-of-the-art, Multimedia Tools and Applications, vol.25, issue.1, p.122, 2005.
DOI : 10.1023/B:MTAP.0000046380.27575.a5

. Swaminathan, Robust and Secure Image Hashing, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, p.135, 2006.
DOI : 10.1109/TIFS.2006.873601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.8613

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, p.136, 2002.
DOI : 10.1142/S0218488502001648

R. Szeliski, Computer Vision: Algorithms and Applications, p.109, 2010.
DOI : 10.1007/978-1-84882-935-0

G. Ta, A. Ta, and G. Gravier, Unsupervised Mining of Multiple Audiovisually Consistent Clusters for Video Structure Analysis, 2012 IEEE International Conference on Multimedia and Expo, p.123, 2012.
DOI : 10.1109/ICME.2012.187

URL : https://hal.archives-ouvertes.fr/hal-00718985

P. Tao and D. Papadias, Range aggregate processing in spatial databases, IEEE Transactions on Knowledge and Data Engineering, issue.12, pp.16-136, 2004.

R. Tavenard, Indexation de séquences de descripteurs, p.140, 2011.

. Tavenard, . Amsaleg, R. Tavenard, and L. Amsaleg, Improving the efficiency of traditional DTW accelerators. Knowledge and Information Systems, p.140, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00862176

. Tavenard, Estimation de similarité entre séquences de descripteurs à l'aide de machines à vecteurs supports, Actes des Journées sur les bases de données avancées, p.140, 2007.

. Tavenard, Machines à vecteurs supports pour la comparaison de séquences de descripteurs, Actes des Journées compression et représentation des signaux audiovisuels, p.140, 2007.

. Tavenard, Model-based similarity estimation of multidimensional temporal sequences, annals of telecommunications - annales des t??l??communications, vol.1, issue.5, p.140, 2009.
DOI : 10.1007/s12243-009-0091-4

URL : https://hal.archives-ouvertes.fr/inria-00567877

. Tavenard, Balancing clusters to reduce response time variability in large scale image search, 2011 9th International Workshop on Content-Based Multimedia Indexing (CBMI), p.65, 2011.
DOI : 10.1109/CBMI.2011.5972514

URL : https://hal.archives-ouvertes.fr/inria-00576886

G. Tómasson, ObjectCube ? A generic multi-dimensional model for media browsing, p.117, 2011.

. Photocube, Effective and efficient multi-dimensional browsing of personal photo collections, Proceedings of the ACM International Conference on Multimedia Retrieval, p.118

. Tómasson, Objectcube: A novel data model for multi-dimensional media browsing, p.118, 2012.

. Tómasson, PhotoCube, Proceedings of the 1st ACM International Conference on Multimedia Retrieval, ICMR '11, p.118, 2012.
DOI : 10.1145/1991996.1992066

. Toubiana, Adnostic: Privacy preserving targeted advertising, Proceedings of the Network and Distributed System Security Symposium, p.136, 2010.

. Van-mulbregt, Text segmentation and topic tracking on broadcast news via a hidden markov model approach, Proceedings of the International Conference on Speech and Language Processing, p.122, 1998.

S. Venugopalan, S. Venugopalan, and M. Savvides, How to Generate Spoofed Irises From an Iris Code Template, IEEE Transactions on Information Forensics and Security, vol.6, issue.2, p.128, 2011.
DOI : 10.1109/TIFS.2011.2108288

T. Vintsyuk, Speech discrimination by dynamic programming, Cybernetics, vol.4, issue.1, p.139, 1968.
DOI : 10.1007/BF01074755

. Wang, Scalable k-NN graph construction for visual descriptors, 2012 IEEE Conference on Computer Vision and Pattern Recognition, p.114, 2012.
DOI : 10.1109/CVPR.2012.6247790

. Weber, A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces, Proceedings of the International Conference on Very Large Data Bases, p.140, 1998.

. Weinzaepfel, Reconstructing an image from its local descriptors, CVPR 2011, p.131, 2011.
DOI : 10.1109/CVPR.2011.5995616

URL : https://hal.archives-ouvertes.fr/inria-00566718

. Weng, A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval, IEEE Transactions on Information Forensics and Security, vol.10, issue.1, pp.132-137, 2014.
DOI : 10.1109/TIFS.2014.2365998

URL : https://hal.archives-ouvertes.fr/hal-01083328

D. C. Koelma, Multimedia pivot tables, Proceedings of Visual Analytics Science and Technology, p.117, 2013.

S. Wu, X. Wu, and S. Satoh, Temporal recurrence hashing algorithm for mining commercials from multimedia streams, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), p.139, 2011.
DOI : 10.1109/ICASSP.2011.5946948

. Yi, Efficient retrieval of similar time sequences under time warping, Proceedings of the IEEE International Conference on Data Engineering, p.139, 1998.

. Yizhi, Adult Image Detection Combining BoVW Based on Region of Interest and Color Moments, Intelligent Information Processing V IFIP Advances in Information and Communication Technology, p.130, 2010.
DOI : 10.1007/978-3-642-16327-2_38

URL : https://hal.archives-ouvertes.fr/hal-01055069

. Yuan, Efficient Mining of Repetitions in Large-Scale TV Streams with Product Quantization Hashing, Proceedings of the European Conference on Computer Vision, Workshop on Web-scale Vision and Social Media, p.123, 2012.
DOI : 10.1007/978-3-642-33863-2_27

URL : https://hal.archives-ouvertes.fr/hal-00731090

. Zaharia, Spark: cluster computing with working sets, Proceedings of the USENIX Conference on Hot Topics in Cloud Computing, p.104, 2010.

. Zaïane, Mining multimedia data, Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, p.117, 1998.

. Zhang, Consumer image retrieval by estimating relation tree from family photo collections, Proceedings of the ACM International Conference on Image and Video Retrieval, CIVR '10, p.135, 2010.
DOI : 10.1145/1816041.1816065