Page 160 - 2023-Vol19-Issue2
P. 160
156 | Mohammed, Oraibi & Hussain
adaptive pixel weighting strategy,” Information Fusion, [14] B. Zafar, R. Ashraf, N. Ali, M. K. Iqbal, M. Sajid, S. H.
p. 101863, 2023. Dar, and N. I. Ratyal, “A novel discriminating and rela-
tive global spatial image representation with applications
[5] Y. Liu, X.-Y. Zhang, J.-W. Bian, L. Zhang, and M.-M. in cbir,” Applied Sciences, vol. 8, no. 11, p. 2242, 2018.
Cheng, “Samnet: Stereoscopically attentive multi-scale
network for lightweight salient object detection,” IEEE [15] W. Wei and Y. Wang, “Color image retrieval based on
Transactions on Image Processing, vol. 30, pp. 3804– quaternion and deep features,” IEEE Access, vol. 7,
3814, 2021. pp. 126430–126438, 2019.
[6] M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Al- [16] Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren,
resheedi, and Z. A. Abduljabbar, “An effective image “A privacy-preserving and copy-deterrence content-based
retrieval based on optimized genetic algorithm utilized a image retrieval scheme in cloud computing,” IEEE trans-
novel svm-based convolutional neural network classifier,” actions on information forensics and security, vol. 11,
Human-centric Computing and Information Sciences, no. 11, pp. 2594–2608, 2016.
vol. 9, pp. 1–29, 2019.
[17] R. Khan, C. Barat, D. Muselet, C. Ducottet, et al., “Spa-
[7] S. G. More and I. Mohammed, “Survey on cbir using k- tial orientations of visual word pairs to improve bag-of-
secure sum protocol in privacy preserving framework’,” visual-words model.,” in BMVC, pp. 1–11, 2012.
International Journal of Computer Science and Informa-
tion Security, IJCSIS, pp. 184–188, 2015. [18] Y. Song, I. V. McLoughlin, and L.-R. Dai, “Local coding
based matching kernel method for image classification,”
[8] M. Yousuf, Z. Mehmood, H. A. Habib, T. Mahmood, PloS one, vol. 9, no. 8, p. e103575, 2014.
T. Saba, A. Rehman, M. Rashid, and etal, “A novel tech-
nique based on visual words fusion analysis of sparse fea- [19] R. Ashraf, T. Mahmood, A. Irtaza, and K. Bajwa, “A
tures for effective content-based image retrieval,” Math- novel approach for the gender classification through
ematical Problems in Engineering, vol. 2018, 2018. trained neural networks,” J. Basic Appl. Sci. Res, vol. 4,
pp. 136–144, 2014.
[9] K. Meethongjan, M. Dzulkifli, A. Rehman, A. Al- [20] L.-J. Li, H. Su, Y. Lim, and L. Fei-Fei, “Object bank: An
tameem, and T. Saba, “An intelligent fused approach for object-level image representation for high-level visual
face recognition,” Journal of Intelligent Systems, vol. 22, recognition,” International journal of computer vision,
no. 2, pp. 197–212, 2013. vol. 107, pp. 20–39, 2014.
[10] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gu¨rses, [21] M. Zang, D. Wen, T. Liu, H. Zou, and C. Liu, “A pooled
F. Piessens, and B. Preneel, “Fpdetective: dusting the object bank descriptor for image scene classification,”
web for fingerprinters,” in Proceedings of the 2013 ACM Expert Systems with Applications, vol. 94, pp. 250–264,
SIGSAC conference on Computer & communications 2018.
security, pp. 1129–1140, 2013.
[22] G. J. Scott, M. R. England, W. A. Starms, R. A. Marcum,
[11] E. Balsa, C. Troncoso, and C. Diaz, “Ob-pws: and C. H. Davis, “Training deep convolutional neural
Obfuscation-based private web search,” in 2012 IEEE networks for land–cover classification of high-resolution
Symposium on Security and Privacy, pp. 491–505, IEEE, imagery,” IEEE Geoscience and Remote Sensing Letters,
2012. vol. 14, no. 4, pp. 549–553, 2017.
[12] R. L. Lagendijk, Z. Erkin, and M. Barni, “Encrypted [23] G. J. Scott, R. A. Marcum, C. H. Davis, and T. W. Nivin,
signal processing for privacy protection: Conveying the “Fusion of deep convolutional neural networks for land
utility of homomorphic encryption and multiparty com- cover classification of high-resolution imagery,” IEEE
putation,” IEEE Signal Processing Magazine, vol. 30, Geoscience and Remote Sensing Letters, vol. 14, no. 9,
no. 1, pp. 82–105, 2012. pp. 1638–1642, 2017.
[13] G.-H. Liu, Z.-Y. Li, L. Zhang, and Y. Xu, “Image re- [24] Y. Xu, Q. Lin, J. Huang, and Y. Fang, “An improved
trieval based on micro-structure descriptor,” Pattern ensemble-learning-based cbir algorithm,” in 2020 Cross
Recognition, vol. 44, no. 9, pp. 2123–2133, 2011. Strait Radio Science & Wireless Technology Conference
(CSRSWTC), pp. 1–3, IEEE, 2020.