Non-local Denoising in Encrypted Images
暂无分享,去创建一个
Weiming Zhang | Nenghai Yu | Honggang Hu | Xianjun Hu | Nenghai Yu | Honggang Hu | Weiming Zhang | Xianjun Hu
[1] Peijia Zheng,et al. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.
[2] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[3] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[4] Nina Mishra,et al. Privacy via the Johnson-Lindenstrauss Transform , 2012, J. Priv. Confidentiality.
[5] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[6] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Jean-Michel Morel,et al. A Review of Image Denoising Algorithms, with a New One , 2005, Multiscale Model. Simul..
[9] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[10] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[11] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[12] Peijia Zheng,et al. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.
[13] Mauro Barni,et al. Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..
[14] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[15] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[16] W. B. Johnson,et al. Extensions of Lipschitz mappings into Hilbert space , 1984 .
[17] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.