-
1
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Jan
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, "Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing," EURASIP J. Inf. Security, vol. 2007, pp. 1-20, Jan. 2007.
-
(2007)
EURASIP J. Inf. Security
, vol.2007
, pp. 1-20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
3
-
-
0023545076
-
How to play ANY mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game," in Proc. 19th Annu. ACM Conf. Theory Comput., 1987, pp. 218-229.
-
(1987)
Proc. 19th Annu ACM Conf. Theory Comput
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptology, 1999, pp. 223-238.
-
(1999)
Proc. Adv. Cryptology
, pp. 223-238
-
-
Paillier, P.1
-
6
-
-
84867553981
-
A Generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Public Key Cryptography
-
I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Proc. Public-Key Cryptography, 2001, pp. 119-136. (Pubitemid 33232937)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
7
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu ACM Symp. Theory Comput
, pp. 169-178
-
-
Gentry, C.1
-
8
-
-
60449095773
-
On the implementation of the discrete Fourier transform in the encrypted domain
-
Mar
-
T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86-97, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
9
-
-
38849191685
-
A secure multidimensional point inclusion protocol
-
DOI 10.1145/1288869.1288884, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. Troncoso-Pastoriza, S. Katzenbeisser, M. Celik, and A. Lemma, "A secure multidimensional point inclusion protocol," in Proc. 9th ACM Workshop Multimedia Security, 2007, pp. 109-120. (Pubitemid 351203809)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 109-120
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
Lemma, A.4
-
10
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
Mar.
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180-187, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
11
-
-
84873926385
-
Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
-
P. Zheng and J. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking," in Proc. 14th Inf. Hiding Conf., 2012, pp. 240-254.
-
(2012)
Proc. 14th Inf. Hiding Conf
, pp. 240-254
-
-
Zheng, P.1
Huang, J.2
-
12
-
-
69949163699
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. 9th Int. Symp. Privacy Enhanc. Technol., 2009, pp. 235-253.
-
(2009)
Proc. 9th Int. Symp. Privacy Enhanc. Technol
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
13
-
-
77954610725
-
Efficient privacypreserving face recognition
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacypreserving face recognition," in Proc. 12th Int. Conf. Inf. Security Cryptol., 2010, pp. 229-244.
-
(2010)
Proc. 12th Int. Conf. Inf. Security Cryptol
, pp. 229-244
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
14
-
-
79957487964
-
Privacy-preserving ECG classification with branching programs and neural networks
-
Jun.
-
M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, "Privacy-preserving ECG classification with branching programs and neural networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 452-468, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.4
Schneider, T.5
-
15
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. D. Labati, and P. Failla, "Privacy-preserving fingercode authentication," in Proc. 12th ACM Workshop Multimedia Security, 2010, pp. 231-240.
-
(2010)
Proc. 12th ACM Workshop Multimedia Security
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.D.5
Failla, P.6
-
16
-
-
78650079218
-
Implementing fingercode-based identity matching in the encrypted domain
-
Italy, Sep
-
T. Bianchi, S. Turchi, A. Piva, R. Labati, V. Piuri, and F. Scotti, "Implementing fingercode-based identity matching in the encrypted domain," in Proc. IEEE Workshop Biometric Meas. Syst. Security Med. Appl., Taranto, Italy, Sep. 2010, pp. 15-21.
-
(2010)
Proc IEEE Workshop Biometric Meas. Syst. Security Med. Appl., Taranto
, pp. 15-21
-
-
Bianchi, T.1
Turchi, S.2
Piva, A.3
Labati, R.4
Piuri, V.5
Scotti, F.6
-
17
-
-
84455169977
-
Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain
-
P. Zheng and J. Huang, "Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain," in Proc. 19th ACM Int. Conf. Multimedia, 2011, pp. 413-422.
-
(2011)
Proc. 19th ACM Int. Conf. Multimedia
, pp. 413-422
-
-
Zheng, P.1
Huang, J.2
-
18
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Cambridge, MA, USA: MIT Press
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation. Cambridge, MA, USA: MIT Press, 1978, pp. 169-178.
-
(1978)
Foundations of Secure Computation
, pp. 169-178
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
19
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
20
-
-
0024700097
-
A theory for multiresolution signal decomposition: The wavelet representation
-
Jul
-
S. Mallat, "A theory for multiresolution signal decomposition: The wavelet representation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 7, pp. 674-693, Jul. 1989.
-
(1989)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.11
, Issue.7
, pp. 674-693
-
-
Mallat, S.1
-
22
-
-
0004057553
-
-
New York , NY USA: McGraw-Hill
-
W. Rudin, Functional Analysis. New York, NY, USA: McGraw-Hill, 1991.
-
(1991)
Functional Analysis
-
-
Rudin, W.1
-
23
-
-
84990623513
-
Biorthogonal bases of compactly supported wavelets
-
A. Cohen, I. Daubechies, and J. Feauveau, "Biorthogonal bases of compactly supported wavelets," Commun. Pure Appl. Math., vol. 45, no. 5, pp. 485-560, 1992.
-
(1992)
Commun. Pure Appl. Math
, vol.45
, Issue.5
, pp. 485-560
-
-
Cohen, A.1
Daubechies, I.2
Feauveau, J.3
-
26
-
-
34250679222
-
JPEG2000: Image compression fundamentals, standards and practice
-
Mar
-
D. Taubman, M. Marcellin, and M. Rabbani, "JPEG2000: Image compression fundamentals, standards and practice," J. Electron. Imag., vol. 11, p. 286, Mar. 2002.
-
(2002)
J. Electron. Imag
, vol.11
, pp. 286
-
-
Taubman, D.1
Marcellin, M.2
Rabbani, M.3
-
27
-
-
0034215495
-
The montgomery modular inverse-revisited
-
Jul
-
E. Savas and C. Koc, "The montgomery modular inverse-revisited, " IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, Jul. 2000.
-
(2000)
IEEE Trans. Comput
, vol.49
, Issue.7
, pp. 763-766
-
-
Savas, E.1
Koc, C.2
-
28
-
-
13244286640
-
A hardware algorithm for modular multiplication/division
-
DOI 10.1109/TC.2005.1
-
M. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Trans. Comput., vol. 54, no. 1, pp. 12-21, Jan. 2005. (Pubitemid 40191757)
-
(2005)
IEEE Transactions on Computers
, vol.54
, Issue.1
, pp. 12-21
-
-
Kaihara, M.E.1
Takagi, N.2
-
29
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
PII S1057714997084601
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997. (Pubitemid 127770522)
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
30
-
-
2142812371
-
Robust real-time face detection
-
P. Viola and M. Jones, "Robust real-time face detection," Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, 2004.
-
(2004)
Int. J. Comput. Vis
, vol.57
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Jones, M.2
|