메뉴 건너뛰기




Volumn , Issue , 2013, Pages 803-812

An efficient image homomorphic encryption scheme with small ciphertext expansion

Author keywords

Ciphertext expansion reducing; Efficient scheme; Homomorphic property; Image encryption; Image processing in the encrypted domain; Secure signal processing

Indexed keywords

CIPHERTEXTS; EFFICIENT SCHEMES; HO-MOMORPHIC ENCRYPTIONS; HOMOMORPHIC CRYPTOSYSTEM; HOMOMORPHIC ENCRYPTION SCHEMES; HOMOMORPHIC PROPERTY; IMAGE ENCRYPTION SCHEME; IMAGE ENCRYPTIONS;

EID: 84887421374     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2502081.2502105     Document Type: Conference Paper
Times cited : (37)

References (27)
  • 2
    • 85032751121 scopus 로고    scopus 로고
    • Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
    • R. L. Lagendijk, Z. Erkin, and M. Barni. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process. Mag., 30(1):82-105, 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.1 , pp. 82-105
    • Lagendijk, R.L.1    Erkin, Z.2    Barni, M.3
  • 8
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Adv. Cryptology (EUROCRYPT'99), pages 223-238. Springer, 1999.
    • (1999) Adv. Cryptology (EUROCRYPT'99) , pp. 223-238
    • Paillier, P.1
  • 9
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • Springer
    • I. Damgard and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Public Key Cryptography, pages 119-136. Springer, 2001.
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 12
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete Fourier transform in the encrypted domain
    • T. Bianchi, A. Piva, and M. Barni. On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Security, 4(1):86-97, 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 14
    • 84455169977 scopus 로고    scopus 로고
    • Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain
    • ACM
    • P. Zheng and J. Huang. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In Proc. 19th ACM Int. Conf. Multimedia, pages 413-422. ACM, 2011.
    • (2011) Proc. 19th ACM Int. Conf. Multimedia , pp. 413-422
    • Zheng, P.1    Huang, J.2
  • 15
    • 84874399599 scopus 로고    scopus 로고
    • Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking
    • Berkeley, CA, Springer
    • P. Zheng and J. Huang. Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In 14th Information Hiding Conf., pages 240-254, Berkeley, CA, 2012. Springer.
    • (2012) 14th Information Hiding Conf. , pp. 240-254
    • Zheng, P.1    Huang, J.2
  • 17
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • T. Bianchi, A. Piva, and M. Barni. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Security, 5(1):180-187, 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.1 , pp. 180-187
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 19
    • 84867864555 scopus 로고    scopus 로고
    • Image feature extraction in encrypted domain with privacy-preserving SIFT
    • C. Hsu, C. Lu, and S. Pei. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process., 21(11):4593-4607, 2012.
    • (2012) IEEE Trans. Image Process. , vol.21 , Issue.11 , pp. 4593-4607
    • Hsu, C.1    Lu, C.2    Pei, S.3
  • 21
    • 1942436689 scopus 로고    scopus 로고
    • Image quality assessment: From error visibility to structural similarity
    • Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process., 13(4):600-612, 2004.
    • (2004) IEEE Trans. Image Process , vol.13 , Issue.4 , pp. 600-612
    • Wang, Z.1    Bovik, A.C.2    Sheikh, H.R.3    Simoncelli, E.P.4
  • 23
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for Paillier encrypted values
    • B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. Adv. Cryptology (EUROCRYPT'06), pages 522-537, 2006.
    • (2006) Adv. Cryptology (EUROCRYPT'06) , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 24
    • 84876808306 scopus 로고    scopus 로고
    • Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain
    • P. Zheng and J. Huang. Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process., 22(6):2455-2468, 2013.
    • (2013) IEEE Trans. Image Process. , vol.22 , Issue.6 , pp. 2455-2468
    • Zheng, P.1    Huang, J.2
  • 25
    • 0026142897 scopus 로고
    • The JPEG still picture compression standard
    • W. K. Gregory. The JPEG still picture compression standard. Commun. ACM, 34(4):30-44, 1991.
    • (1991) Commun. ACM , vol.34 , Issue.4 , pp. 30-44
    • Gregory, W.K.1
  • 27
    • 33746989201 scopus 로고    scopus 로고
    • Secure advanced video coding based on selective encryption algorithms
    • S. Lian, Z. Liu, R. Zhen, and H. Wang. Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron., 52(2):621-629, 2006.
    • (2006) IEEE Trans. Consum. Electron. , vol.52 , Issue.2 , pp. 621-629
    • Lian, S.1    Liu, Z.2    Zhen, R.3    Wang, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.