메뉴 건너뛰기




Volumn 92, Issue 4, 2012, Pages 1069-1078

Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images

Author keywords

Additive homomorphism; Elliptic curve ElGamal; Image encryption

Indexed keywords

COMPUTATION OVERHEADS; ELGAMAL; ELLIPTIC CURVE; ENCRYPTION SCHEMES; HOMOMORPHIC PROPERTY; IMAGE DECRYPTIONS; IMAGE ENCRYPTION SCHEME; IMAGE ENCRYPTIONS; POHLIG-HELLMAN; SECRET IMAGES;

EID: 83955163724     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2011.10.020     Document Type: Article
Times cited : (120)

References (23)
  • 1
    • 77955518611 scopus 로고    scopus 로고
    • Efficient multi-secret image sharing based on Boolean operations
    • T.H. Chen, and C.S. Wu Efficient multi-secret image sharing based on Boolean operations Signal Processing 91 1 2011 90 97
    • (2011) Signal Processing , vol.91 , Issue.1 , pp. 90-97
    • Chen, T.H.1    Wu, C.S.2
  • 2
    • 64549086284 scopus 로고    scopus 로고
    • MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
    • C.N. Yang, A.G. Peng, and T.S. Chen MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty Signal Processing 89 8 2009 1602-1624
    • (2009) Signal Processing , vol.89 , Issue.8 , pp. 1602-1624
    • Yang, C.N.1    Peng, A.G.2    Chen, T.S.3
  • 3
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • Article ID 13801, doi
    • C. Fontaine, F. Galand, A survey of homomorphic encryption for nonspecialists, EURASIP Journal on Information Security 2007 (2007), Article ID 13801, doi: 10.1155/2007/13801.
    • (2007) EURASIP Journal on Information Security 2007
    • Fontaine, C.1    Galand, F.2
  • 5
    • 70350551960 scopus 로고    scopus 로고
    • A homomorphic method for sharing secret images
    • N. Islam, W. Puech, and R. Brouzet. A homomorphic method for sharing secret images Digital Watermarking LNCS 5703 2009 121 135
    • (2009) Digital Watermarking LNCS , vol.5703 , pp. 121-135
    • Islam, N.1    Puech, W.2    Brouzet, R.3
  • 6
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 21 2 1978 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 8
    • 85037118321 scopus 로고    scopus 로고
    • Efficient multiplicative homomorphic e-voting
    • K. Peng, and F. Bao Efficient multiplicative homomorphic e-voting Information Security LNCS 6531 2010 381 393
    • (2010) Information Security LNCS , vol.6531 , pp. 381-393
    • Peng, K.1    Bao, F.2
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. E1Gamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 31 4 1985 469 472
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 10
    • 79957452485 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
    • O. Ugus, D. Westhoff, R. Laue, A. Shoufan, S.A. Huss, Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks, CoRR abs/0903.3900, 2009.
    • (2009) CoRR abs/0903.3900
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 12
    • 83955163424 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: Homomorphism versus watermarking approach
    • J.M. Bahi, C. Guyeux, and A. Makhoul Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach Ad Hoc Networks, LNICST 49 2010 344 358
    • (2010) Ad Hoc Networks, LNICST , vol.49 , pp. 344-358
    • Bahi, J.M.1    Guyeux, C.2    Makhoul, A.3
  • 14
    • 77951953963 scopus 로고    scopus 로고
    • Secure distortion computation among untrusting parties using homomorphic encryption
    • Cairo, Eygpt, IEEE, 710 November
    • S.D. Rane, W. Sun, A. Vetro, Secure distortion computation among untrusting parties using homomorphic encryption, in: Proceedings of the 16th IEEE International Conference on Image Processing, Cairo, Eygpt, IEEE, 710 November 2009, pp. 14851488.
    • (2009) Proceedings of the 16th IEEE International Conference on Image Processing , pp. 1485-1488
    • Rane, S.D.1    Sun, W.2    Vetro, A.3
  • 15
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Advances in Cryptology - Eurocrypt '99, LNCS, vol. 1592, 1999, pp. 223238.
    • (1999) Advances in Cryptology - Eurocrypt '99, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 16
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • DOI 10.1109/TIP.2005.859383
    • M. Kuribayashi, and H. Tanaka Fingerprinting protocol for images based on additive homomorphic property IEEE Transactions on Image Processing 14 12 2005 2129 2139 (Pubitemid 41763728)
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 21
    • 84855359030 scopus 로고    scopus 로고
    • 〈http://libtomcrypt.org/tfm/features.html[EB/OL]〉.
  • 23
    • 57749200497 scopus 로고    scopus 로고
    • Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
    • X. Tong, and M. Cui Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator Signal Processing 89 4 2009 480 491
    • (2009) Signal Processing , vol.89 , Issue.4 , pp. 480-491
    • Tong, X.1    Cui, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.