W
Wenjun Lu
Researcher at University of Maryland, College Park
Publications - 11
Citations - 626
Wenjun Lu is an academic researcher from University of Maryland, College Park. The author has contributed to research in topics: Image retrieval & Hash function. The author has an hindex of 8, co-authored 10 publications receiving 548 citations. Previous affiliations of Wenjun Lu include Google.
Papers
More filters
Proceedings ArticleDOI
Enabling search over encrypted multimedia databases
TL;DR: Wang et al. as discussed by the authors proposed a secure indexing scheme for content-based retrieval over encrypted multimedia databases, which is first encrypted by the content owner and then stored onto the server.
Proceedings ArticleDOI
Secure image retrieval through feature protection
TL;DR: Experimental results show that secure image retrieval can achieve comparable retrieval performance to conventional image retrieval techniques without revealing information about image content.
Journal ArticleDOI
Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization
TL;DR: This paper focuses on comparing these two major paradigms of techniques, namely, homomorphic encryption-based techniques and feature/index randomization- based techniques, for confidentiality-preserving image search, and develops novel and systematic metrics to quantitatively evaluate security strength in this unique type of data and applications.
Proceedings ArticleDOI
Multimedia forensic hash based on visual words
Wenjun Lu,Min Wu +1 more
TL;DR: This paper encodes SIFT features into a compact visual words representation for robust estimation of geometric transformations and proposes a hybrid construction using both SIFT and block-based features to detect and localize image tampering.
Proceedings ArticleDOI
Security analysis for privacy preserving search of multimedia
TL;DR: A security definition for the privacy preserving retrieval scenario is introduced and it is shown that the recently proposed schemes are secure under the proposed security definition.