Skip to main content

Signal Processing in the Encrypted Domain

  1. Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensit...

    Authors: Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González
    Citation: EURASIP Journal on Information Security 2008 2007:045731
  2. One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...

    Authors: S.-C. S. Cheung and Thinh Nguyen
    Citation: EURASIP Journal on Information Security 2007 2007:051368
  3. Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...

    Authors: Caroline Fontaine and Fabien Galand
    Citation: EURASIP Journal on Information Security 2007 2007:013801
  4. Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...

    Authors: J. P. Prins, Z. Erkin and R. L. Lagendijk
    Citation: EURASIP Journal on Information Security 2007 2007:031340
  5. This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error r...

    Authors: Michael Gschwandtner, Andreas Uhl and Peter Wild
    Citation: EURASIP Journal on Information Security 2007 2007:048179
  6. The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...

    Authors: C Orlandi, A Piva and M Barni
    Citation: EURASIP Journal on Information Security 2007 2007:037343