CryptoImg: Privacy preserving processing over encrypted images
暂无分享,去创建一个
Mani B. Srivastava | M. Tarek Ibn Ziad | Moustafa Alzantot | Amr Al-Anwar | M. Srivastava | Amr Al-Anwar | M. Alzantot | M. Tarek | Ibn Ziad
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Paul Scheunders,et al. Advanced Concepts for Intelligent Vision Systems , 2018, Lecture Notes in Computer Science.
[3] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[4] Xiaohui Yuan,et al. Ensure privacy and security in the process of medical image analysis , 2013, 2013 IEEE International Conference on Granular Computing (GrC).
[5] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[6] Yan Zhang,et al. A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.
[7] Ali Shokoufandeh,et al. Secure Signal Processing Using Fully Homomorphic Encryption , 2015, ACIVS.
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] Weiming Zhang,et al. Secure Nonlocal Denoising in Outsourced Images , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[10] Pierangela Samarati. Security and Privacy in the Cloud , 2016, CLOSER.
[11] Milan Sonka,et al. Image pre-processing , 1993 .
[12] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[13] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[14] Nan Hu,et al. Secure Image Filtering , 2006, 2006 International Conference on Image Processing.
[15] Jean-Michel Morel,et al. A Review of Image Denoising Algorithms, with a New One , 2005, Multiscale Model. Simul..
[16] Pradeep K. Atrey,et al. Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..