Research Article
Secure and Efficient Image Retrieval over Encrypted Cloud Data
Table 4
Comparison of encrypted image retrieval schemes.
| Goals | Yuan [20] | Xia [19] | Weng [6] | Weng [7] | Cheng [22, 23] | Proposed |
| Efficiency | | | ā | ā | Query Pattern | | | | | | | Access Pattern | | | | | | |
|
|