Page 160 - 2023-Vol19-Issue2
P. 160

156 |                                                             Mohammed, Oraibi & Hussain

     adaptive pixel weighting strategy,” Information Fusion,      [14] B. Zafar, R. Ashraf, N. Ali, M. K. Iqbal, M. Sajid, S. H.
     p. 101863, 2023.                                                   Dar, and N. I. Ratyal, “A novel discriminating and rela-
                                                                        tive global spatial image representation with applications
[5] Y. Liu, X.-Y. Zhang, J.-W. Bian, L. Zhang, and M.-M.                in cbir,” Applied Sciences, vol. 8, no. 11, p. 2242, 2018.
     Cheng, “Samnet: Stereoscopically attentive multi-scale
     network for lightweight salient object detection,” IEEE      [15] W. Wei and Y. Wang, “Color image retrieval based on
    Transactions on Image Processing, vol. 30, pp. 3804–                quaternion and deep features,” IEEE Access, vol. 7,
     3814, 2021.                                                        pp. 126430–126438, 2019.

[6] M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Al-             [16] Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren,
     resheedi, and Z. A. Abduljabbar, “An effective image               “A privacy-preserving and copy-deterrence content-based
     retrieval based on optimized genetic algorithm utilized a          image retrieval scheme in cloud computing,” IEEE trans-
     novel svm-based convolutional neural network classifier,”          actions on information forensics and security, vol. 11,
    Human-centric Computing and Information Sciences,                   no. 11, pp. 2594–2608, 2016.
    vol. 9, pp. 1–29, 2019.
                                                                  [17] R. Khan, C. Barat, D. Muselet, C. Ducottet, et al., “Spa-
[7] S. G. More and I. Mohammed, “Survey on cbir using k-                tial orientations of visual word pairs to improve bag-of-
     secure sum protocol in privacy preserving framework’,”             visual-words model.,” in BMVC, pp. 1–11, 2012.
    International Journal of Computer Science and Informa-
     tion Security, IJCSIS, pp. 184–188, 2015.                    [18] Y. Song, I. V. McLoughlin, and L.-R. Dai, “Local coding
                                                                        based matching kernel method for image classification,”
[8] M. Yousuf, Z. Mehmood, H. A. Habib, T. Mahmood,                     PloS one, vol. 9, no. 8, p. e103575, 2014.
    T. Saba, A. Rehman, M. Rashid, and etal, “A novel tech-
     nique based on visual words fusion analysis of sparse fea-   [19] R. Ashraf, T. Mahmood, A. Irtaza, and K. Bajwa, “A
     tures for effective content-based image retrieval,” Math-          novel approach for the gender classification through
     ematical Problems in Engineering, vol. 2018, 2018.                 trained neural networks,” J. Basic Appl. Sci. Res, vol. 4,
                                                                        pp. 136–144, 2014.

[9] K. Meethongjan, M. Dzulkifli, A. Rehman, A. Al-               [20] L.-J. Li, H. Su, Y. Lim, and L. Fei-Fei, “Object bank: An
     tameem, and T. Saba, “An intelligent fused approach for            object-level image representation for high-level visual
     face recognition,” Journal of Intelligent Systems, vol. 22,        recognition,” International journal of computer vision,
     no. 2, pp. 197–212, 2013.                                          vol. 107, pp. 20–39, 2014.

[10] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gu¨rses,     [21] M. Zang, D. Wen, T. Liu, H. Zou, and C. Liu, “A pooled
      F. Piessens, and B. Preneel, “Fpdetective: dusting the            object bank descriptor for image scene classification,”
      web for fingerprinters,” in Proceedings of the 2013 ACM           Expert Systems with Applications, vol. 94, pp. 250–264,
      SIGSAC conference on Computer & communications                    2018.
      security, pp. 1129–1140, 2013.
                                                                  [22] G. J. Scott, M. R. England, W. A. Starms, R. A. Marcum,
[11] E. Balsa, C. Troncoso, and C. Diaz, “Ob-pws:                       and C. H. Davis, “Training deep convolutional neural
      Obfuscation-based private web search,” in 2012 IEEE               networks for land–cover classification of high-resolution
      Symposium on Security and Privacy, pp. 491–505, IEEE,             imagery,” IEEE Geoscience and Remote Sensing Letters,
      2012.                                                             vol. 14, no. 4, pp. 549–553, 2017.

[12] R. L. Lagendijk, Z. Erkin, and M. Barni, “Encrypted          [23] G. J. Scott, R. A. Marcum, C. H. Davis, and T. W. Nivin,
      signal processing for privacy protection: Conveying the           “Fusion of deep convolutional neural networks for land
      utility of homomorphic encryption and multiparty com-             cover classification of high-resolution imagery,” IEEE
      putation,” IEEE Signal Processing Magazine, vol. 30,              Geoscience and Remote Sensing Letters, vol. 14, no. 9,
      no. 1, pp. 82–105, 2012.                                          pp. 1638–1642, 2017.

[13] G.-H. Liu, Z.-Y. Li, L. Zhang, and Y. Xu, “Image re-         [24] Y. Xu, Q. Lin, J. Huang, and Y. Fang, “An improved
      trieval based on micro-structure descriptor,” Pattern             ensemble-learning-based cbir algorithm,” in 2020 Cross
      Recognition, vol. 44, no. 9, pp. 2123–2133, 2011.                 Strait Radio Science & Wireless Technology Conference
                                                                        (CSRSWTC), pp. 1–3, IEEE, 2020.
   155   156   157   158   159   160   161   162   163   164   165