Secure and Private Outsourcing of Shape-Based Feature Extraction.
Shumiao WangMohamed NassarMikhail J. AtallahQutaibah M. MalluhiPublished in: ICICS (2013)
Keyphrases
- feature extraction
- homomorphic encryption
- information technology
- privacy preserving
- level set
- preprocessing
- feature vectors
- object recognition
- pattern classification
- discriminant analysis
- image classification
- image processing
- supplier selection
- extracted features
- shape features
- frequency domain
- linear feature extraction
- scalar product
- information systems
- principal component analysis
- face recognition
- linear discriminant analysis
- texture analysis
- data sharing
- feature selection
- dimension reduction
- dimensionality reduction
- palmprint
- object detection
- service providers
- private data
- security issues
- defect detection
- user authentication
- wavelet transform
- identity management
- feature extraction and classification
- image preprocessing
- feature extractors
- multiresolution
- authentication protocol
- key management
- security requirements
- multi party
- iris recognition
- risk management
- feature set
- texture features
- business process
- lightweight
- support vector machine svm