-
2
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Erkin Z., Piva A., Katzenbeisser S., Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing EURASIP Journal on Information Security 2007 2007 20
-
(2007)
EURASIP Journal on Information Security
, vol.2007
, pp. 20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
-
5
-
-
51449123140
-
Implementing the discrete Fourier transform in the encrypted domain
-
March-April 2008 Las Vegas, Nev, USA
-
Bianchi T., Piva A., Barni M., Implementing the discrete Fourier transform in the encrypted domain Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 08) March-April 2008 Las Vegas, Nev, USA 1757 1760
-
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 08)
, pp. 1757-1760
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
7
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
New York, NY, USA Springer Lecture Notes in Computer Science
-
Paillier P., Public-key cryptosystems based on composite degree residuosity classes Advances in Cryptology 1999 1592 New York, NY, USA Springer 223 238 Lecture Notes in Computer Science
-
(1999)
Advances in Cryptology
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
8
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Kuribayashi M., Tanaka H., Fingerprinting protocol for images based on additive homomorphic property IEEE Transactions on Image Processing 2005 14 12 2129 2139
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
10
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Goethals B., Laur S., Lipmaa H., Mielikinen T., On private scalar product computation for privacy-preserving data mining 3506 Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC 04) 2004 104 120 Lecture Notes in Computer Science
-
Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC 04) 2004 Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikinen, T.4
-
12
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
2001 London, UK Springer Lecture Notes in Computer Science
-
Cramer R., Damgrd I., Nielsen J. B., Multiparty computation from threshold homomorphic encryption 2045 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 01) 2001 London, UK Springer 280 299 Lecture Notes in Computer Science
-
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 01)
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damgrd, I.2
Nielsen, J.B.3
-
13
-
-
0005301490
-
On data banks and privacy homomorphisms
-
New York, NY, USA Academic Press
-
Rivest R., Adleman L., Dertouzos M., DeMillo R. A., Lipton R. J., Dobkin D. P., Jones A. K., On data banks and privacy homomorphisms Foundations of Secure Computation 1978 New York, NY, USA Academic Press 169 179
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
Demillo, R.A.4
Lipton, R.J.5
Dobkin, D.P.6
Jones, A.K.7
-
17
-
-
0035503753
-
Integer DCTs and fast algorithms
-
Zeng Y., Cheng L., Bi G., Kot A. C., Integer DCTs and fast algorithms IEEE Transactions on Signal Processing 2001 49 11 2774 2782
-
(2001)
IEEE Transactions on Signal Processing
, vol.49
, Issue.11
, pp. 2774-2782
-
-
Zeng, Y.1
Cheng, L.2
Bi, G.3
Kot, A.C.4
-
20
-
-
84943728327
-
A fast recursive algorithm for computing the discrete cosine transform
-
Hou H., A fast recursive algorithm for computing the discrete cosine transform IEEE Transactions on Acoustics, Speech, and Signal Processing 1987 35 10 1455 1461
-
(1987)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.35
, Issue.10
, pp. 1455-1461
-
-
Hou, H.1
-
22
-
-
0032320512
-
Mask building for perceptually hiding frequency embedded watermarks
-
October3 Chicago, Ill, USA
-
Bartolini F., Barni M., Cappellini V., Piva A., Mask building for perceptually hiding frequency embedded watermarks 1 Proceedings of the 5th IEEE International Conference on Image Processing (ICIP 98) October 1998 Chicago, Ill, USA 450 454
-
(1998)
Proceedings of the 5th IEEE International Conference on Image Processing (ICIP 98)
, vol.1
, pp. 450-454
-
-
Bartolini, F.1
Barni, M.2
Cappellini, V.3
Piva, A.4
-
24
-
-
85019328136
-
-
http://gmplib.org/
-
GNU Multiple Precision Arithmetic Library. http://gmplib.org/
-
-
-
|