scispace - formally typeset
Proceedings ArticleDOI

Digital image watermarking of homomorphic encrypted images: A review

Reads0
Chats0
TLDR
This paper reviews various different watermarking techniques on homomorphic encrypted images.
Abstract
Digital image watermarking is a process of embedding a target image to the host image. A target image is known as watermark image. A host image is the image on which watermarking is done. Digital Image Watermarking is used for copyright protection, authenticity determination, ensuring tamper-resistance. This paper reviews various different watermarking techniques on homomorphic encrypted images.

read more

Citations
More filters
Journal ArticleDOI

Homomorphic encryption systems statement: Trends and challenges

TL;DR: This study will be presenting different known cryptosystems based on the homomorphic encryption, all joined with other techniques to enhance the cryptos system performance and the privacy ratio.
Book ChapterDOI

Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium Blockchain

TL;DR: Wang et al. as discussed by the authors proposed a decentralized digital asset trustworthy copyright confirmation and transaction mechanism, which combines the common digital watermark technology in the field of traditional digital asset copyright confirmation.
Proceedings ArticleDOI

A Survey on Homomorphic Encryption for Biometrics Template Security Based on Machine Learning Models

TL;DR: In this article , the authors examined the viability of securing a database of iris templates using a methodology based on fully homomorphic encryption, which is designed to protect confidentiality and restrict information from leaking from the templates while preserving their utility.
Proceedings ArticleDOI

A Survey on Homomorphic Encryption for Biometrics Template Security Based on Machine Learning Models

TL;DR: In this paper , the authors examined the viability of securing a database of iris templates using a methodology based on fully homomorphic encryption, which is designed to protect confidentiality and restrict information from leaking from the templates while preserving their utility.
Journal ArticleDOI

Hardware Implementation of Robust Digital Image Watermarking using Neural Network– A Survey

TL;DR: This paper limits the survey to images only and presents a detailed survey of existing and newly existing watermarking techniques, typically used for authentication and copyright.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Book ChapterDOI

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.

On data banks and privacy homomorphisms

TL;DR: It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.
Book ChapterDOI

A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System

TL;DR: A generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property is proposed.