Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing
暂无分享,去创建一个
Stefan Katzenbeisser | Mauro Barni | Alessandro Piva | Zekeriya Erkin | Gregory Neven | Reginald L. Lagendijk | Jamshid Shokrollahi | S. Katzenbeisser | G. Neven | R. Lagendijk | A. Piva | Z. Erkin | M. Barni | J. Shokrollahi
[1] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[2] Ahmad-Reza Sadeghi,et al. Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme , 2005, Communications and Multimedia Security.
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[5] Stefan Katzenbeisser,et al. Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.
[6] Wenliang Du,et al. SVD-based collaborative filtering with privacy , 2005, SAC '05.
[7] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[8] Jaideep Vaidya,et al. Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data , 2003 .
[9] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[10] M. Barni,et al. Data hiding for fighting piracy , 2004, IEEE Signal Processing Magazine.
[11] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[12] Helger Lipmaa,et al. On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.
[13] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[14] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[15] Kannan Ramchandran,et al. Distributed source coding using syndromes (DISCUS): design and construction , 2003, IEEE Trans. Inf. Theory.
[16] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[17] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[18] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[19] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[20] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[21] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[22] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[23] Josep Domingo-Ferrer. A New Privacy Homomorphism and Applications , 1996, Inf. Process. Lett..
[24] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[25] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[26] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[27] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[28] Stefan Katzenbeisser,et al. A secure multidimensional point inclusion protocol , 2007, MM&Sec.
[29] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[30] Pim Tuyls,et al. Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.
[31] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[32] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[33] Mohan S. Kankanhalli,et al. Copyright protection for MPEG-2 compressed broadcast video , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..
[34] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[35] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[36] Nathan Srebro,et al. Fast maximum margin matrix factorization for collaborative prediction , 2005, ICML.
[37] John Riedl,et al. Application of Dimensionality Reduction in Recommender Systems , 2000 .
[38] Scott Craver. Zero Knowledge Watermark Detection , 1999, Information Hiding.
[39] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[40] Bernd Girod,et al. Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.
[41] Jung Hee Cheon,et al. A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism , 2003, IACR Cryptol. ePrint Arch..
[42] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[43] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[44] Mauro Barni,et al. Zero-knowledge ST-DM watermarking , 2006, Electronic Imaging.
[45] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[46] Pierre Duhamel,et al. An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.
[47] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[48] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[49] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[50] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[51] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[52] Ahmad-Reza Sadeghi,et al. Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2007, Trans. Data Hiding Multim. Secur..
[53] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[54] Sen-Ching S. Cheung,et al. Secure Multiparty Computation between Distrusted Networks Terminals , 2007, EURASIP J. Inf. Secur..
[55] Mohammed Yakoob Siyal,et al. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection , 2006, EURASIP J. Adv. Signal Process..
[56] Chris Clifton,et al. Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.
[57] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[58] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[59] Fernando Pérez-González,et al. Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks , 2007, Electronic Imaging.
[60] Fillia Makedon,et al. A privacy-preserving collaborative filtering scheme with two-way communication , 2006, EC '06.
[61] Stefan Katzenbeisser,et al. Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[62] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[63] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[64] John F. Canny,et al. Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.
[65] Rebecca N. Wright,et al. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.
[66] Roland Parviainen,et al. Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.
[67] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[68] David A. Wagner,et al. Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.
[69] Ivan Damgård,et al. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order , 2002, ASIACRYPT.
[70] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[71] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[72] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[73] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[74] Kenneth Y. Goldberg,et al. Eigentaste: A Constant Time Collaborative Filtering Algorithm , 2001, Information Retrieval.
[75] Jun Zhang,et al. Secure buyer-seller watermarking protocol , 2006 .
[76] Ton Kalker,et al. A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.
[77] Mauro Barni,et al. Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .
[78] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[79] Bernd Girod,et al. Asymmetric Watermarking Schemes , 2000 .
[80] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[81] Wenliang Du,et al. Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[82] Stefan Katzenbeisser,et al. Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.