메뉴 건너뛰기




Volumn 22, Issue 6, 2013, Pages 2455-2468

Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain

Author keywords

Data expansion; discrete wavelet transform (DWT); homomorphic encryption; multiplicative inverse method (MIM); multiresolution analysis (MRA); secure signal processing; signal processing in the encrypted domain

Indexed keywords

COMPUTATIONAL COMPLEXITY ANALYSIS; DATA EXPANSION; HAAR WAVELET TRANSFORM; HO-MOMORPHIC ENCRYPTIONS; MULTIPLICATIVE INVERSE; NEW TECHNOLOGIES; QUANTIZATION ERRORS; SIGNAL PROCESSING IN THE ENCRYPTED DOMAINS;

EID: 84876808306     PISSN: 10577149     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIP.2013.2253474     Document Type: Article
Times cited : (95)

References (30)
  • 4
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Jul
    • T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 5
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptology, 1999, pp. 223-238.
    • (1999) Proc. Adv. Cryptology , pp. 223-238
    • Paillier, P.1
  • 6
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • Public Key Cryptography
    • I. Damgård and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in Proc. Public-Key Cryptography, 2001, pp. 119-136. (Pubitemid 33232937)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 7
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
    • (2009) Proc. 41st Annu ACM Symp. Theory Comput , pp. 169-178
    • Gentry, C.1
  • 8
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete Fourier transform in the encrypted domain
    • Mar
    • T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86-97, Mar. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 10
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • Mar.
    • T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180-187, Mar. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 11
    • 84873926385 scopus 로고    scopus 로고
    • Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
    • P. Zheng and J. Huang, "Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking," in Proc. 14th Inf. Hiding Conf., 2012, pp. 240-254.
    • (2012) Proc. 14th Inf. Hiding Conf , pp. 240-254
    • Zheng, P.1    Huang, J.2
  • 14
    • 79957487964 scopus 로고    scopus 로고
    • Privacy-preserving ECG classification with branching programs and neural networks
    • Jun.
    • M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, "Privacy-preserving ECG classification with branching programs and neural networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 452-468, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.2 , pp. 452-468
    • Barni, M.1    Failla, P.2    Lazzeretti, R.3    Sadeghi, A.4    Schneider, T.5
  • 17
    • 84455169977 scopus 로고    scopus 로고
    • Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain
    • P. Zheng and J. Huang, "Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain," in Proc. 19th ACM Int. Conf. Multimedia, 2011, pp. 413-422.
    • (2011) Proc. 19th ACM Int. Conf. Multimedia , pp. 413-422
    • Zheng, P.1    Huang, J.2
  • 18
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • Cambridge, MA, USA: MIT Press
    • R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation. Cambridge, MA, USA: MIT Press, 1978, pp. 169-178.
    • (1978) Foundations of Secure Computation , pp. 169-178
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3
  • 19
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 20
    • 0024700097 scopus 로고
    • A theory for multiresolution signal decomposition: The wavelet representation
    • Jul
    • S. Mallat, "A theory for multiresolution signal decomposition: The wavelet representation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 7, pp. 674-693, Jul. 1989.
    • (1989) IEEE Trans. Pattern Anal. Mach. Intell , vol.11 , Issue.7 , pp. 674-693
    • Mallat, S.1
  • 22
    • 0004057553 scopus 로고
    • New York , NY USA: McGraw-Hill
    • W. Rudin, Functional Analysis. New York, NY, USA: McGraw-Hill, 1991.
    • (1991) Functional Analysis
    • Rudin, W.1
  • 23
    • 84990623513 scopus 로고
    • Biorthogonal bases of compactly supported wavelets
    • A. Cohen, I. Daubechies, and J. Feauveau, "Biorthogonal bases of compactly supported wavelets," Commun. Pure Appl. Math., vol. 45, no. 5, pp. 485-560, 1992.
    • (1992) Commun. Pure Appl. Math , vol.45 , Issue.5 , pp. 485-560
    • Cohen, A.1    Daubechies, I.2    Feauveau, J.3
  • 26
    • 34250679222 scopus 로고    scopus 로고
    • JPEG2000: Image compression fundamentals, standards and practice
    • Mar
    • D. Taubman, M. Marcellin, and M. Rabbani, "JPEG2000: Image compression fundamentals, standards and practice," J. Electron. Imag., vol. 11, p. 286, Mar. 2002.
    • (2002) J. Electron. Imag , vol.11 , pp. 286
    • Taubman, D.1    Marcellin, M.2    Rabbani, M.3
  • 27
    • 0034215495 scopus 로고    scopus 로고
    • The montgomery modular inverse-revisited
    • Jul
    • E. Savas and C. Koc, "The montgomery modular inverse-revisited, " IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, Jul. 2000.
    • (2000) IEEE Trans. Comput , vol.49 , Issue.7 , pp. 763-766
    • Savas, E.1    Koc, C.2
  • 28
    • 13244286640 scopus 로고    scopus 로고
    • A hardware algorithm for modular multiplication/division
    • DOI 10.1109/TC.2005.1
    • M. Kaihara and N. Takagi, "A hardware algorithm for modular multiplication/division," IEEE Trans. Comput., vol. 54, no. 1, pp. 12-21, Jan. 2005. (Pubitemid 40191757)
    • (2005) IEEE Transactions on Computers , vol.54 , Issue.1 , pp. 12-21
    • Kaihara, M.E.1    Takagi, N.2
  • 29
  • 30
    • 2142812371 scopus 로고    scopus 로고
    • Robust real-time face detection
    • P. Viola and M. Jones, "Robust real-time face detection," Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, 2004.
    • (2004) Int. J. Comput. Vis , vol.57 , Issue.2 , pp. 137-154
    • Viola, P.1    Jones, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.