-
1
-
-
85023809951
-
Threshold cryptosystems
-
Desmedt, Y. and Frankel, Y. (1989) 'Threshold cryptosystems', CRYPTO, pp. 307-315.
-
(1989)
CRYPTO
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
3
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser S. and Micali S. (1984) 'Probabilistic encryption', J. Comput. Syst. Sci., Vol. 28, No. 2, pp. 270-299.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
4
-
-
84925747975
-
-
ECRYPT Network of Excellence Technical Report, European Network of Excellence in Cryptology
-
ECRYPT Network of Excellence Technical Report (2006) D.WVL.11: Benchmarking Metrics and Concepts for Perceptual, European Network of Excellence in Cryptology, http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.11-1.0.pdf.
-
(2006)
D.WVL.11: Benchmarking Metrics and Concepts for Perceptual
-
-
-
5
-
-
84962762130
-
Robust hash function for digital watermarking
-
Fridrich, J., Gojan, M. and Du, R. (2000) 'Robust hash function for digital watermarking', IEEE International Conference on Information Technology: Coding and Computing (ITCC' 2000), pp. 178-183.
-
(2000)
IEEE International Conference on Information Technology: Coding and Computing (ITCC'2000).
, pp. 178-183
-
-
Fridrich, J.1
Gojan, M.2
Du, R.3
-
6
-
-
79957991215
-
Implementing gentry's fullyhomomorphic encryption scheme
-
Gentry, C. and Halevi, S.(2010) 'Implementing gentry's fullyhomomorphic encryption scheme', IACR Cryptology ePrint Archive, Vol. 2010, p.520.
-
(2010)
IACR Cryptology ePrint Archive
, vol.2010
, pp. 520
-
-
Gentry, C.1
Halevi, S.2
-
8
-
-
84876044597
-
An order-sorted query system for sort, predicate, and meta-predicate hierarchies
-
Kaneiwa, K. and Nguyen, P.H.P. (2013) 'An order-sorted query system for sort, predicate, and meta-predicate hierarchies', Knowl. Inf. Syst., Vol. 35, No. 2, pp. 463-492.
-
(2013)
Knowl. Inf. Syst.
, vol.35
, Issue.2
, pp. 463-492
-
-
Kaneiwa, K.1
Nguyen, P.H.P.2
-
10
-
-
42949140392
-
Security analysis of robust perceptual hashing
-
January
-
Koval, O., Voloshynovskiy, S., Beekhof, F. and Pun, T. (2008) 'Security analysis of robust perceptual hashing', Proc. SPIE Media Forensics Security, January, pp. 68190601-68190613.
-
(2008)
Proc. SPIE Media Forensics Security
, pp. 68190601-68190613
-
-
Koval, O.1
Voloshynovskiy, S.2
Beekhof, F.3
Pun, T.4
-
11
-
-
70450269832
-
On security threats for robust perceptual hashing
-
SPIE, January
-
Koval, O., Voloshynovskiy, S., Bas, P. and Cayre, F. (2009) 'On security threats for robust perceptual hashing', Proc. SPIE Media Forensics Security, SPIE, January, pp. 72540H-72540H-13.
-
(2009)
Proc. SPIE Media Forensics Security
, pp. 72540H-72540H13
-
-
Koval, O.1
Voloshynovskiy, S.2
Bas, P.3
Cayre, F.4
-
12
-
-
84925831573
-
-
(In the Hacker Factor Blog).
-
Krawetz, N. (2011) Looks Like It (In the Hacker Factor Blog), http://www.hackerfactor.com/blog/index.php?/archives/432-Looks-Like-It.html
-
(2011)
Looks Like It
-
-
Krawetz, N.1
-
13
-
-
84925831572
-
-
(In the Hacker Factor Blog).
-
Krawetz, N. (2013) Kind of Like That (In the Hacker Factor Blog), http://hackerfactor.com/blog/index.php?/archives/529-Kindof-like-That.html
-
(2013)
Kind of Like That
-
-
Krawetz, N.1
-
14
-
-
84897769013
-
Modeling and analysis of correlated binary fingerprints for content identification
-
15-18 September, Melbourne, VIC
-
Laradji, I., Ghouti, L. and Khiari, E.H. (2013) 'Modeling and analysis of correlated binary fingerprints for content identification', 2013 20th IEEE International Conference on Image Processing (ICIP), 15-18 September, Melbourne, VIC, pp. 4402-4406.
-
(2013)
2013 20th IEEE International Conference on Image Processing (ICIP).
, pp. 4402-4406
-
-
Laradji, I.1
Ghouti, L.2
Khiari, E.H.3
-
15
-
-
33751435956
-
Commutative watermarking and encryption for media data
-
August 2006
-
Lian, S.G., Liu, Z.X., Ren, Z. andWang, H.L. (2006) 'Commutative watermarking and encryption for media data', International Journal of Optical Engineering, Vol. 45, No. 8, August, pp. 0805101-0805103 2006.
-
(2006)
International Journal of Optical Engineering
, vol.45
, Issue.8
, pp. 0805101-0805103
-
-
Lian, S.G.1
Liu, Z.X.2
Ren, Z.3
Wang, H.L.4
-
16
-
-
34250017964
-
Commutative encryption and watermarking in compressed video data
-
June
-
Lian, S.G., Liu, Z.X., Ren, Z. andWang, H.L. (2007) 'Commutative encryption and watermarking in compressed video data', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 17, No. 6, June, pp. 774-778.
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.G.1
Liu, Z.X.2
Ren, Z.3
Wang, H.L.4
-
17
-
-
70349216521
-
Secure image retrieval through feature protection
-
IEEE
-
Lu, W., Varna, A.L., Swaminathan, A. and Wu M. (2009) 'Secure image retrieval through feature protection', ICASSP, IEEE, pp. 1533-1536.
-
(2009)
ICASSP
, pp. 1533-1536
-
-
Lu, W.1
Varna, A.L.2
Swaminathan, A.3
Wu, M.4
-
18
-
-
77951834415
-
Forensic hash for multimedia information
-
SPIE, 18-20 January, San Jose, CA, USA
-
Lu, W.J., Varna, A.L. and Wu, M. (2010a) 'Forensic hash for multimedia information', Proc. SPIE Media Forensics Security, SPIE, 18-20 January, San Jose, CA, USA, pp. 39-48.
-
(2010)
Proc. SPIE Media Forensics Security
, pp. 39-48
-
-
Lu, W.J.1
Varna, A.L.2
Wu, M.3
-
19
-
-
78651068288
-
Security analysis for privacy preserving search of multimedia
-
IEEE
-
Lu,W.,Varna, A.L. andWu, M. (2010b) 'Security analysis for privacy preserving search of multimedia', ICIP, IEEE, pp. 2093-2096.
-
(2010)
ICIP
, pp. 2093-2096
-
-
Lu, W.1
Varna, A.L.2
Wu, M.3
-
20
-
-
34548104101
-
Unicity distance of robust image hashing
-
1
-
Mao, Y.N. and Wu, M. (2007) 'Unicity distance of robust image hashing', IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3-1, pp. 462-467.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 462-467
-
-
Mao, Y.N.1
Wu, M.2
-
21
-
-
20444464472
-
Robust perceptual image hashing using feature points
-
IEEE
-
Monga, V. and Evans, B.L. (2004) 'Robust perceptual image hashing using feature points', ICIP, IEEE, pp. 677-680.
-
(2004)
ICIP
, pp. 677-680
-
-
Monga, V.1
Evans, B.L.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', EUROCRYPT, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman L.M. (1978) 'A method for obtaining digital signatures and public-key cryptosystems', Commun. ACM, Vol. 21, No. 2, pp. 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
84876040990
-
An efficient conceptbased retrieval model for enhancing text retrieval quality
-
Shehata, S., Karray, F. and Kamel, M.S. (2013) 'An efficient conceptbased retrieval model for enhancing text retrieval quality', Knowl. Inf. Syst., Vol. 35, No. 2, pp. 411-434.
-
(2013)
Knowl. Inf. Syst.
, vol.35
, Issue.2
, pp. 411-434
-
-
Shehata, S.1
Karray, F.2
Kamel, M.S.3
-
25
-
-
77649266762
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Smart, N.P. and Vercauteren, F. (2009) 'Fully homomorphic encryption with relatively small key and ciphertext sizes', IACR Cryptology ePrint Archive, Vol. 2009, p.571.
-
(2009)
IACR Cryptology ePrint Archive
, vol.2009
, pp. 571
-
-
Smart, N.P.1
Vercauteren, F.2
-
26
-
-
33744764278
-
Robust and secure image hashing
-
Swaminathan, A., Mao, Y. and Wu, M. (2006) 'Robust and secure image hashing', IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
27
-
-
70350582578
-
Hash-based identification of sparse image tampering
-
Tagliasacchi, M., Valenzise, G. and Tubaro, S. (2009) 'Hash-based identification of sparse image tampering', IEEE Transactions on Image Processing, Vol. 18, No. 11, pp. 2491-2504.
-
(2009)
IEEE Transactions on Image Processing
, vol.18
, Issue.11
, pp. 2491-2504
-
-
Tagliasacchi, M.1
Valenzise, G.2
Tubaro, S.3
-
28
-
-
84894472419
-
Robust perceptual image hashing based on ring partition and NMF
-
March
-
Tang, Z.J., Zhang, X.Q. and Zhan, S.C. (2014) 'Robust perceptual image hashing based on ring partition and NMF', IEEE Trans. on Knowledge and Data Engineering, Vol. 26, No. 3, March, pp. 711-724.
-
(2014)
IEEE Trans. on Knowledge and Data Engineering
, vol.26
, Issue.3
, pp. 711-724
-
-
Tang, Z.J.1
Zhang, X.Q.2
Zhan, S.C.3
-
29
-
-
84897779960
-
-
The National Science and Technology Council, August
-
The National Science and Technology Council (2006) Biometrics Overview, http://www.biometrics.gov/documents/biooverview.pdf, August.
-
(2006)
Biometrics Overview
-
-
-
30
-
-
77954631631
-
Fully homomorphic encryption over the integers
-
van Dijk, M., Gentry, C., Halevi, S. and Vaikuntanathan, V. (2009) 'Fully homomorphic encryption over the integers', IACR Cryptology ePrint Archive, Vol. 2009, p.616.
-
(2009)
IACR Cryptology ePrint Archive
, vol.2009
, pp. 616
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
31
-
-
80051752479
-
Modeling and analysis of correlated binary fingerprints for content identification
-
September
-
Varna, A. and Wu, M. (2011) 'Modeling and analysis of correlated binary fingerprints for content identification', IEEE Trans. on Info. Forensics and Security, Vol. 6, No. 3, September, pp. 1146-1159.
-
(2011)
IEEE Trans. on Info. Forensics and Security
, vol.6
, Issue.3
, pp. 1146-1159
-
-
Varna, A.1
Wu, M.2
-
32
-
-
0034444578
-
Robust image hashing
-
Venkatesanan, R., Koon, S., Jacubowski, M. and Moulin, P. (2000) 'Robust image hashing', IEEE International Conference on Image Processing (ICIP' 2000), pp. 664-666.
-
(2000)
IEEE International Conference on Image Processing (ICIP' 2000).
, pp. 664-666
-
-
Venkatesanan, R.1
Koon, S.2
Jacubowski, M.3
Moulin, P.4
-
33
-
-
79951771642
-
Image authentication based on perceptual hash using gabor filters
-
March
-
Wang, L.N., Jiang, X.Q., Lian, S.G., Hu, D.H. and Ye, D.P. (2009) 'Image authentication based on perceptual hash using gabor filters', International Journal of Soft Computing, Vol. 15, No. 3, March, pp. 493-504.
-
(2009)
International Journal of Soft Computing
, vol.15
, Issue.3
, pp. 493-504
-
-
Wang, L.N.1
Jiang, X.Q.2
Lian, S.G.3
Hu, D.H.4
Ye, D.P.5
-
34
-
-
84925760560
-
-
Wikipedia, the Free Encyclopedia, August accessed on 23 December, 2013
-
Wikipedia (2013) Hamming Distance-Wikipedia, the Free Encyclopedia, http://en.wikipedia.org/wiki/Hamming distance (accessed on 23 December, 2013).
-
(2013)
Hamming Distance-Wikipedia
-
-
-
35
-
-
84876208459
-
Hashing based fast palmprint identification for large-scale databases
-
May
-
Yue, F., Li, B., Yu, M. and Wang, J. (2013) 'Hashing based fast palmprint identification for large-scale databases', IEEE Trans. on Info. Forensics and Security,Vol. 8, No. 5, May, pp. 769-778.
-
(2013)
IEEE Trans. on Info. Forensics and Security
, vol.8
, Issue.5
, pp. 769-778
-
-
Yue, F.1
Li, B.2
Yu, M.3
Wang, J.4
-
36
-
-
84866631944
-
Privacyaware image classification and search
-
12-16 August, Oregon, USA
-
Zerr, S., Siersdorfer, S., Hare, J. and Demidova, E. (2012) 'Privacyaware image classification and search', Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, 12-16 August, Oregon, USA, pp. 35-44.
-
(2012)
Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 35-44
-
-
Zerr, S.1
Siersdorfer, S.2
Hare, J.3
Demidova, E.4
-
37
-
-
84872026878
-
Robust hashing for image authentication using zernike moments and local features
-
January
-
Zhao,Y.,Wang, S., Zhang, X. andYao, H. (2013) 'Robust hashing for image authentication using zernike moments and local features', IEEE Trans. on Info. Forensics and Security, Vol. 8, No. 1, January, pp. 55-63.
-
(2013)
IEEE Trans. on Info. Forensics and Security
, vol.8
, Issue.1
, pp. 55-63
-
-
Zhao, Y.1
Wang, S.2
Zhang, X.3
Yao, H.4
|