Proceedings ArticleDOI
Digital image watermarking of homomorphic encrypted images: A review
Jaskaran Singh,Prabhpreet Kaur +1 more
- pp 1790-1793
Reads0
Chats0
TLDR
This paper reviews various different watermarking techniques on homomorphic encrypted images.Abstract:
Digital image watermarking is a process of embedding a target image to the host image. A target image is known as watermark image. A host image is the image on which watermarking is done. Digital Image Watermarking is used for copyright protection, authenticity determination, ensuring tamper-resistance. This paper reviews various different watermarking techniques on homomorphic encrypted images.read more
Citations
More filters
Journal ArticleDOI
Homomorphic encryption systems statement: Trends and challenges
TL;DR: This study will be presenting different known cryptosystems based on the homomorphic encryption, all joined with other techniques to enhance the cryptos system performance and the privacy ratio.
Book ChapterDOI
Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium Blockchain
TL;DR: Wang et al. as discussed by the authors proposed a decentralized digital asset trustworthy copyright confirmation and transaction mechanism, which combines the common digital watermark technology in the field of traditional digital asset copyright confirmation.
Proceedings ArticleDOI
A Survey on Homomorphic Encryption for Biometrics Template Security Based on Machine Learning Models
Pavani Chitrapu,Hemanth Kalluri +1 more
TL;DR: In this article , the authors examined the viability of securing a database of iris templates using a methodology based on fully homomorphic encryption, which is designed to protect confidentiality and restrict information from leaking from the templates while preserving their utility.
Proceedings ArticleDOI
A Survey on Homomorphic Encryption for Biometrics Template Security Based on Machine Learning Models
TL;DR: In this paper , the authors examined the viability of securing a database of iris templates using a methodology based on fully homomorphic encryption, which is designed to protect confidentiality and restrict information from leaking from the templates while preserving their utility.
Journal ArticleDOI
Hardware Implementation of Robust Digital Image Watermarking using Neural Network– A Survey
TL;DR: This paper limits the survey to images only and presents a detailed survey of existing and newly existing watermarking techniques, typically used for authentication and copyright.
References
More filters
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI
Fully homomorphic encryption using ideal lattices
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Book ChapterDOI
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
TL;DR: In this article, a new signature scheme is proposed together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem and the security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
On data banks and privacy homomorphisms
TL;DR: It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.
Book ChapterDOI
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
Ivan Damgård,Mads J. Jurik +1 more
TL;DR: A generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property is proposed.
Related Papers (5)
A Recent Survey of DCT Based Digital Image Watermarking Theories and Techniques: A Review
Ranjeet Singh,Anil Kumar Singh +1 more
A Secure Watermarking and Tampering Detection Technique on RGB Image Using 2 Level DWT
Madhuri Rajawat,D S Tomar +1 more