Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization
暂无分享,去创建一个
[1] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[2] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[3] Yonghong Zeng,et al. Integer DCTs and fast algorithms , 2001, IEEE Trans. Signal Process..
[4] Hsieh S. Hou. A fast recursive algorithm for computing the discrete cosine transform , 1987, IEEE Trans. Acoust. Speech Signal Process..
[5] H. Andrews,et al. Hadamard transform image coding , 1969 .
[6] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Fernando Pérez-González,et al. Fully Private Noninteractive Face Verification , 2013, IEEE Transactions on Information Forensics and Security.
[8] C. K. Yuen. Walsh Functions and Gray Code , 1971 .
[9] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[10] Ahmad-Reza Sadeghi,et al. Securing the e-health cloud , 2010, IHI.
[11] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[12] J. Tukey,et al. An algorithm for the machine calculation of complex Fourier series , 1965 .
[13] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[14] Alan Edelman,et al. Optimal Matrix Transposition and Bit Reversal on Hypercubes: All-to-All Personalized Communication , 1991, J. Parallel Distributed Comput..
[15] Mauro Barni,et al. Piecewise Function Approximation With Private Data , 2015, IEEE Transactions on Information Forensics and Security.
[16] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.
[17] Alan George,et al. FFT algorithms and their adaptation to parallel processing , 1998 .
[18] Bela Feher,et al. Digital filters based on recursive Walsh-Hadamard transformation , 1990 .
[19] Naofumi Takagi,et al. A hardware algorithm for modular multiplication/division , 2005, IEEE Transactions on Computers.
[20] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[21] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[22] Wai-kuen Cham,et al. Fast Algorithm for Walsh Hadamard Transform on Sliding Windows , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] Alessandro Piva,et al. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.
[24] Ivan Damgård,et al. Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.
[25] Yukio Kosugi,et al. Hadamard-based image decomposition and compression , 2000, IEEE Transactions on Information Technology in Biomedicine.
[26] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[27] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[28] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[29] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[30] Debargha Mukherjee,et al. The latest open-source video codec VP9 - An overview and preliminary results , 2013, 2013 Picture Coding Symposium (PCS).
[31] Vipin Kumar,et al. The Scalability of FFT on Parallel Computers , 1993, IEEE Trans. Parallel Distributed Syst..
[32] Bart Preneel,et al. A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer , 2011, IEEE Transactions on Information Forensics and Security.
[33] Nasir Ahmed,et al. On Notation and Definition of Terms Related to a Class of Complete Orthogonal Functions , 1973 .
[34] Peijia Zheng,et al. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.
[35] Mauro Barni,et al. Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..
[36] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[37] Yacov Hel-Or,et al. Real-time pattern matching using projection kernels , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[38] Thijs Veugen,et al. Encrypted integer division , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[39] H. Kitajima. Energy Packing Efficiency of the Hadamard Transform , 1976, IEEE Trans. Commun..
[40] Weiming Zhang,et al. Secure Nonlocal Denoising in Outsourced Images , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[41] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[42] Susanto Rahardja,et al. Conjugate Symmetric Sequency-Ordered Complex Hadamard Transform , 2009, IEEE Transactions on Signal Processing.
[43] Jameela Al-Jaroodi,et al. e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.
[44] Andreas Peter,et al. SOFIR: Securely outsourced Forensic image recognition , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[45] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[46] Susanto Rahardja,et al. Sequency-Ordered Complex Hadamard Transform: Properties, Computational Complexity and Applications , 2008, IEEE Transactions on Signal Processing.
[47] Zekeriya Erkin,et al. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.
[48] S. Rahardja,et al. Family of unified complex Hadamard transforms , 1999 .
[49] B. N. Chatterji,et al. Designing Quantization Table for Hadamard Transform based on Human Visual System for Image Compression , 2007 .
[50] C.-C. Jay Kuo,et al. MAI-Free MC-CDMA Systems Based on Hadamard–Walsh Codes , 2006, IEEE Transactions on Signal Processing.
[51] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[52] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.