Skip to main content

Signal Processing in the Encrypted Domain

  1. Review Article

    A Survey of Homomorphic Encryption for Nonspecialists

    Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...

    Caroline Fontaine and Fabien Galand

    EURASIP Journal on Information Security 2007 2007:013801

    Published on: 11 December 2007

  2. Research Article

    Secure Multiparty Computation between Distrusted Networks Terminals

    One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...

    S.-C. S. Cheung and Thinh Nguyen

    EURASIP Journal on Information Security 2007 2007:051368

    Published on: 11 December 2007

  3. Research Article

    Anonymous Fingerprinting with Robust QIM Watermarking Techniques

    Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...

    J. P. Prins, Z. Erkin and R. L. Lagendijk

    EURASIP Journal on Information Security 2007 2007:031340

    Published on: 10 December 2007

  4. Research Article

    Oblivious Neural Network Computing via Homomorphic Encryption

    The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...

    C Orlandi, A Piva and M Barni

    EURASIP Journal on Information Security 2007 2007:037343

    Published on: 24 July 2007

top