Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain
暂无分享,去创建一个
[1] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[2] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[3] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.
[4] Peijia Zheng,et al. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.
[5] Naofumi Takagi,et al. A hardware algorithm for modular multiplication/division , 2005, IEEE Transactions on Computers.
[6] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Vincenzo Piuri,et al. Implementing FingerCode-based identity matching in the encrypted domain , 2010, 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications.
[11] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[12] Peijia Zheng,et al. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.
[13] I. Daubechies,et al. Biorthogonal bases of compactly supported wavelets , 1992 .
[14] Michael W. Marcellin,et al. JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.
[15] Stefan Katzenbeisser,et al. A secure multidimensional point inclusion protocol , 2007, MM&Sec.
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] Srinadh Godavarthy. Generating spline wavelets , 1998, ACM-SE 36.
[18] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[19] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[21] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[24] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[25] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[26] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Erkay Savas,et al. The Montgomery Modular Inverse-Revisited , 2000, IEEE Trans. Computers.
[28] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[29] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..