Face search in encrypted domain
aut.relation.endpage | 790 | |
aut.relation.issue | 1 | en_NZ |
aut.relation.pages | 12 | |
aut.relation.startpage | 775 | |
aut.relation.volume | 9431 | en_NZ |
aut.researcher | Yan, Wei-Qi | |
dc.contributor.author | Yan, W-Q | en_NZ |
dc.contributor.author | Kankanhalli, M | en_NZ |
dc.date.accessioned | 2016-04-27T02:31:45Z | |
dc.date.available | 2016-04-27T02:31:45Z | |
dc.date.copyright | 2015-11-23 | en_NZ |
dc.date.issued | 2015-11-23 | en_NZ |
dc.description.abstract | Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage of speed over performing those operations in spatial, temporal, frequency or compressed domain. In this paper, we will investigate encrypted image search. More specifically, given a face image as the target object, we search it amongst encrypted images. We accomplish the search by using a novel method that extracts features and locates the face object region within the given encrypted image. We evaluate the search results by using precision and recall as well as F-measure. Our experiments reveal that there exists a trade-off between the quality of search and the quality of encryption, namely, stronger encryption leads to poorer search results. | |
dc.identifier.citation | 7th Pacific Rim Symposium on Image and Video Technology held at New Zealand, Auckland, 2015-11-23 to 2015-11-25, published in: 7th Pacific Rim Symposium on Image and Video Technology, vol.9431(1), pp.775 - 790 (12) | en_NZ |
dc.identifier.doi | 10.1007/978-3-319-29451-3_61 | en_NZ |
dc.identifier.isbn | 978-3-319-29450-6 | en_NZ |
dc.identifier.uri | https://hdl.handle.net/10292/9745 | |
dc.publisher | Springer | en_NZ |
dc.relation.uri | http://dx.doi.org/10.1007/978-3-319-29451-3_61 | en_NZ |
dc.rights | An author may self-archive an author-created version of his/her article on his/her own website and or in his/her institutional repository. He/she may also deposit this version on his/her funder’s or funder’s designated repository at the funder’s request or as a result of a legal obligation, provided it is not made publicly available until 12 months after official publication. He/ she may not use the publisher's PDF version, which is posted on www.springerlink.com, for the purpose of self-archiving or deposit. Furthermore, the author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at www.springerlink.com”. (Please also see Publisher’s Version and Citation). | |
dc.rights.accessrights | OpenAccess | en_NZ |
dc.subject | Image encryption; Object detection; Encrypted domain | |
dc.title | Face search in encrypted domain | en_NZ |
dc.type | Conference Contribution | |
pubs.elements-id | 191682 | |
pubs.organisational-data | /AUT | |
pubs.organisational-data | /AUT/Design & Creative Technologies |