-
1
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni. Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Security, pages 1-20, 2007.
-
(2007)
EURASIP J. Inf. Security
, pp. 1-20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
2
-
-
85032751121
-
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
-
R. L. Lagendijk, Z. Erkin, and M. Barni. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process. Mag., 30(1):82-105, 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, R.L.1
Erkin, Z.2
Barni, M.3
-
3
-
-
69949163699
-
Privacy-preserving face recognition
-
Springer
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Privacy Enhancing Technologies, pages 235-253. Springer, 2009.
-
(2009)
Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
4
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
ACM
-
M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. D. Labati, and P. Failla. Privacy-preserving fingercode authentication. In Proc. 12th ACM Workshop on Multimedia Security, pages 231-240. ACM, 2010.
-
(2010)
Proc. 12th ACM Workshop on Multimedia Security
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.D.5
Failla, P.6
-
5
-
-
79957487964
-
Privacy-preserving ECG classification with branching programs and neural networks
-
M. Barni, P. Failla, R. Lazzeretti, A.R. Sadeghi, and T. Schneider. Privacy-preserving ECG classification with branching programs and neural networks. IEEE Trans. Inf. Forensics Security, (99):452-468, 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, Issue.99
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.R.4
Schneider, T.5
-
8
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Adv. Cryptology (EUROCRYPT'99), pages 223-238. Springer, 1999.
-
(1999)
Adv. Cryptology (EUROCRYPT'99)
, pp. 223-238
-
-
Paillier, P.1
-
9
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
Springer
-
I. Damgard and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Public Key Cryptography, pages 119-136. Springer, 2001.
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
12
-
-
60449095773
-
On the implementation of the discrete Fourier transform in the encrypted domain
-
T. Bianchi, A. Piva, and M. Barni. On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Security, 4(1):86-97, 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
14
-
-
84455169977
-
Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain
-
ACM
-
P. Zheng and J. Huang. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In Proc. 19th ACM Int. Conf. Multimedia, pages 413-422. ACM, 2011.
-
(2011)
Proc. 19th ACM Int. Conf. Multimedia
, pp. 413-422
-
-
Zheng, P.1
Huang, J.2
-
15
-
-
84874399599
-
Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
-
Berkeley, CA, Springer
-
P. Zheng and J. Huang. Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In 14th Information Hiding Conf., pages 240-254, Berkeley, CA, 2012. Springer.
-
(2012)
14th Information Hiding Conf.
, pp. 240-254
-
-
Zheng, P.1
Huang, J.2
-
16
-
-
38849191685
-
A secure multidimensional point inclusion protocol
-
ACM
-
J.R. Troncoso-Pastoriza, S. Katzenbeisser, M. Celik, and A. Lemma. A secure multidimensional point inclusion protocol. In Proc. 9th ACM Workshop on Multimedia and Security, pages 109-120. ACM, 2007.
-
(2007)
Proc. 9th ACM Workshop on Multimedia and Security
, pp. 109-120
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
Lemma, A.4
-
17
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Security, 5(1):180-187, 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
19
-
-
84867864555
-
Image feature extraction in encrypted domain with privacy-preserving SIFT
-
C. Hsu, C. Lu, and S. Pei. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process., 21(11):4593-4607, 2012.
-
(2012)
IEEE Trans. Image Process.
, vol.21
, Issue.11
, pp. 4593-4607
-
-
Hsu, C.1
Lu, C.2
Pei, S.3
-
20
-
-
84875864074
-
Emerging cryptographic challenges in image and video processing
-
IEEE
-
W. Puech, Z. Erkin, M. Barni, S. Rane, and R. L. Lagendijk. Emerging cryptographic challenges in image and video processing. In IEEE Int. Conf. Image Process. (ICIP'12), pages 2629-2632. IEEE, 2012.
-
(2012)
IEEE Int. Conf. Image Process. (ICIP'12)
, pp. 2629-2632
-
-
Puech, W.1
Erkin, Z.2
Barni, M.3
Rane, S.4
Lagendijk, R.L.5
-
21
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process., 13(4):600-612, 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
22
-
-
4744354027
-
On compressing encrypted data
-
Mark Johnson, Prakash Ishwar, Vinod Prabhakaran, Daniel Schonberg, and Kannan Ramchandran. On compressing encrypted data. IEEE Trans. Signal Process., 52(10):2992-3006, 2004.
-
(2004)
IEEE Trans. Signal Process
, vol.52
, Issue.10
, pp. 2992-3006
-
-
Johnson, M.1
Ishwar, P.2
Prabhakaran, V.3
Schonberg, D.4
Ramchandran, K.5
-
23
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. Adv. Cryptology (EUROCRYPT'06), pages 522-537, 2006.
-
(2006)
Adv. Cryptology (EUROCRYPT'06)
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
24
-
-
84876808306
-
Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain
-
P. Zheng and J. Huang. Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process., 22(6):2455-2468, 2013.
-
(2013)
IEEE Trans. Image Process.
, vol.22
, Issue.6
, pp. 2455-2468
-
-
Zheng, P.1
Huang, J.2
-
25
-
-
0026142897
-
The JPEG still picture compression standard
-
W. K. Gregory. The JPEG still picture compression standard. Commun. ACM, 34(4):30-44, 1991.
-
(1991)
Commun. ACM
, vol.34
, Issue.4
, pp. 30-44
-
-
Gregory, W.K.1
-
27
-
-
33746989201
-
Secure advanced video coding based on selective encryption algorithms
-
S. Lian, Z. Liu, R. Zhen, and H. Wang. Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron., 52(2):621-629, 2006.
-
(2006)
IEEE Trans. Consum. Electron.
, vol.52
, Issue.2
, pp. 621-629
-
-
Lian, S.1
Liu, Z.2
Zhen, R.3
Wang, H.4
|