2007
DOI: 10.1155/2007/78943
|View full text |Cite
|
Sign up to set email alerts
|

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

Abstract: The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-to-go fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 93 publications
(56 citation statements)
references
References 21 publications
0
50
0
Order By: Relevance
“…To embed additional data into the image, the data-hider first decomposes the encrypted image E into four sub-images E (1) , E (2) , E (3) and E (4) , each sized…”
Section: B Data Embeddingmentioning
confidence: 99%
“…To embed additional data into the image, the data-hider first decomposes the encrypted image E into four sub-images E (1) , E (2) , E (3) and E (4) , each sized…”
Section: B Data Embeddingmentioning
confidence: 99%
“…In parallel, other works developed some general tools for processing some particular operations on encrypted signals, which can be useful in many applications, e.g., Gram-Schmidt orthogonalization [13], discrete cosine transform computation [5], and discrete Fourier transform computation [6]. Finally, one can mention general discussions on the processing of encrypted signals [12] and attempts to find adequate representations for such processing, as in [7].…”
Section: What Is the Impact On Signal Processing?mentioning
confidence: 99%
“…the seller) who embeds his share of the watermark into the content has no idea what the final embedded watermark is. This technique is termed as watermarking in the encrypted domain [7]. As for who should generate the buyer watermark, there are two different techniques: -In the first technique introduced by Memon and Wong [18], a special trusted third party commonly known as the Watermark Certification Authority (W CA) was introduced to generate buyer watermarks, instead of letting the distributor to generate them; the WCA is fully trusted.…”
Section: Main Techniquesmentioning
confidence: 99%