咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 7 篇 signal processin...
  • 3 篇 homomorphic encr...
  • 2 篇 bgv cryptosystem
  • 1 篇 reversible water...
  • 1 篇 data security
  • 1 篇 reversible data ...
  • 1 篇 privacy protecti...
  • 1 篇 somewhat homomor...
  • 1 篇 block truncation...
  • 1 篇 2d vector graphi...
  • 1 篇 data mining
  • 1 篇 scalable coding
  • 1 篇 graphics
  • 1 篇 fft
  • 1 篇 adaptive samplin...
  • 1 篇 image compressio...
  • 1 篇 qr decomposition
  • 1 篇 encryption
  • 1 篇 cloud computing
  • 1 篇 discrete sine tr...

机构

  • 2 篇 chinese acad sci...
  • 2 篇 hong kong univ s...
  • 1 篇 shanghai jiao to...
  • 1 篇 hunan univ sch c...
  • 1 篇 sun yat sen univ...
  • 1 篇 harbin inst tech...
  • 1 篇 changsha univ sc...
  • 1 篇 sun yat sen univ...
  • 1 篇 anhui univ key l...
  • 1 篇 shanghai univ sc...
  • 1 篇 guangdong key la...
  • 1 篇 univ macau fac s...
  • 1 篇 umacau zhuhai re...

作者

  • 3 篇 zheng peijia
  • 2 篇 zeng huicong
  • 2 篇 cai zhiwei
  • 2 篇 liu hongmei
  • 2 篇 luo weiqi
  • 2 篇 au oscar c.
  • 1 篇 zhou jiantao
  • 1 篇 chui sung-him
  • 1 篇 sun wenxiu
  • 1 篇 cheng ziyan
  • 1 篇 zhai guangtao
  • 1 篇 zhang yonghong
  • 1 篇 li yujun
  • 1 篇 niu xuejing
  • 1 篇 liu xianming
  • 1 篇 zhang xinpeng
  • 1 篇 tang yuan yan
  • 1 篇 xu lingfeng
  • 1 篇 tang jin
  • 1 篇 qi ying

语言

  • 7 篇 英文
检索条件"主题词=Signal processing in encrypted domain"
7 条 记 录,以下是1-10 订阅
排序:
Scalable Compression of Stream Cipher encrypted Images Through Context-Adaptive Sampling
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2014年 第11期9卷 1857-1868页
作者: Zhou, Jiantao Au, Oscar C. Zhai, Guangtao Tang, Yuan Yan Liu, Xianming Univ Macau Fac Sci & Technol Dept Comp & Informat Sci Macau Peoples R China UMacau Zhuhai Res Inst Zhuhai 519080 Peoples R China Hong Kong Univ Sci & Technol Dept Elect & Comp Engn Hong Kong Hong Kong Peoples R China Shanghai Jiao Tong Univ Inst Image Commun & Informat Proc Shanghai 200030 Peoples R China Harbin Inst Technol Sch Comp Sci & Technol Harbin 150001 Peoples R China
This paper proposes a novel scalable compression method for stream cipher encrypted images, where stream cipher is used in the standard format. The bit stream in the base layer is produced by coding a series of nonove... 详细信息
来源: 评论
Separable Robust Reversible Watermarking in encrypted 2D Vector Graphics
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2020年 第8期30卷 2391-2405页
作者: Peng, Fei Jiang, Wen-Yan Qi, Ying Lin, Zi-Xing Long, Min Hunan Univ Sch Comp Sci & Elect Engn Changsha 410082 Hunan Peoples R China Changsha Univ Sci & Technol Sch Comp & Commun Engn Changsha 410114 Peoples R China
To accomplish robust watermark extraction in reversible watermarking both in plaintext domain and encrypted domain, a separable robust reversible watermarking in encrypted 2D vector graphics is proposed in this paper.... 详细信息
来源: 评论
Secure Evaluation of Discrete Sine Transform in Homomorphic encrypted domain  8th
Secure Evaluation of Discrete Sine Transform in Homomorphic ...
收藏 引用
8th International Conference on Artificial Intelligence and Security (ICAIS)
作者: Zeng, Huicong Cai, Zhiwei Zheng, Peijia Liu, Hongmei Luo, Weiqin Sun Yat Sen Univ Sch Comp Sci & Engn Guangdong Key Lab Informat Secur Technol Guangzhou 510006 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
Discrete sine transform (DST) is widely used in compression encoding, image processing, and speech enhancement. In cloud computing, outsourcing plaintext data to the cloud has the risk of private data leakage. In this... 详细信息
来源: 评论
Reversible Data Hiding in encrypted AMBTC Compressed Images  15th
Reversible Data Hiding in Encrypted AMBTC Compressed Images
收藏 引用
15th International Workshop on Digital-Forensics and Watermarking 2016 (IWDW)
作者: Niu, Xuejing Yin, Zhaoxia Zhang, Xinpeng Tang, Jin Luo, Bin Anhui Univ Key Lab Intelligent Comp & Signal Proc Minist Educ Hefei 230601 Anhui Peoples R China Shanghai Univ Sch Commun & Informat Engn Shanghai 200072 Peoples R China
signal processing in encrypted domain has attracted high attention during the needs of content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) also becomes a hot topic. However, mo... 详细信息
来源: 评论
AN ANALYSIS ON BITWISE OPERATIONS IN THE encrypted domain
AN ANALYSIS ON BITWISE OPERATIONS IN THE ENCRYPTED DOMAIN
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Chui, Sung-Him Au, Oscar C. Kwok, Chun-Wing Li, Yujun Xu, Lingfeng Sun, Wenxiu Hong Kong Univ Sci & Technol Dept Elect & Comp Engn Hong Kong Hong Kong Peoples R China
When encrypted data need to be sent to an untrusted computer for processing, it is highly desirable to have a homomorphic cryptosystem that allows the untrusted computer to process the encrypted signals totally withou... 详细信息
来源: 评论
Privacy-Preserving Outsourcing Computation of QR Decomposition in the encrypted domain  18
Privacy-Preserving Outsourcing Computation of QR Decompositi...
收藏 引用
18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE)
作者: Zhang, Yonghong Zheng, Peijia Luo, Weiqi Sun Yat Sen Univ Sch Data & Comp Sci GuangDong Prov Key Lab Informat Secur Technol Guangzhou 510006 Peoples R China
signal processing in encrypted domain has become an important mean to protect privacy in an untrusted network environment. Due to the limitations of the underlying encryption methods, many useful algorithms that are s... 详细信息
来源: 评论
Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision  20
Secure Homomorphic Evaluation of Discrete Cosine Transform w...
收藏 引用
20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Cai, Zhiwei Zeng, Huicong Zheng, Peijia Cheng, Ziyan Luo, Weiqi Liu, Hongmei Guangdong Key Lab Informat Secur Technol Sch Comp Sci & Engn Guangzhou Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China
signal processing in the encrypted domain (SPED) has received considerable attention as it aims at privacy-preserving solutions for various applications. Discrete cosine transform (DCT) is a popular signal transform w... 详细信息
来源: 评论