Articles with "encrypted domain" as a keyword



Face authentication in encrypted domain based on correlation filters

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-5275-8

Abstract: Privacy and security are main concerns in face authentication by cloud or semi-honest server. To deal with this problem, a face authentication method based on correlation filters in encrypted domain is presented in this paper.… read more here.

Keywords: based correlation; authentication; face authentication; encrypted domain ... See more keywords
Photo from wikipedia

Homomorphic Encryption-Based LSB Substitution for High Capacity Data Hiding in the Encrypted Domain

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3001385

Abstract: During the last few decades, multimedia security over the cloud has become a major issue. Public-key homomorphism is an efficient approach for data hiding in encrypted images (DHEI). An original image is encrypted using a… read more here.

Keywords: encrypted domain; data hiding; original image; image ... See more keywords
Photo from wikipedia

Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Image Processing"

DOI: 10.1109/tip.2018.2802199

Abstract: Since homomorphic encryption operations have high computational complexity, image applications based on homomorphic encryption are often time consuming, which makes them impractical. In this paper, we study efficient encrypted image applications with the encrypted domain… read more here.

Keywords: hadamard transform; image; efficient encrypted; walsh hadamard ... See more keywords