Non-local Denoising in Encrypted Images
详细信息    查看全文
  • 作者:Xianjun Hu (17)
    Weiming Zhang (17)
    Honggang Hu (17)
    Nenghai Yu (17)
  • 关键词:Paillier homomorphic encryption ; Image denoising ; Non ; Local Means ; Johnson ; Lindenstrauss Transform
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2014
  • 出版时间:2014
  • 年:2014
  • 卷:8662
  • 期:1
  • 页码:386-395
  • 全文大小:1,307 KB
  • 参考文献:1. Bianchi, T., Piva, A., Barni, M.: Encrypted domain dct based on homomorphic cryptosystems. EURASIP Journal on Information Security 2009, 聽1 (2009)
    2. Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete fourier transform in the encrypted domain. IEEE Transactions on Information Forensics and Security聽4(1), 86鈥?7 (2009) CrossRef
    3. Buades, A., Coll, B., Morel, J.: A review of image denoising algorithms, with a new one. Multiscale Modeling & Simulation聽4(2), 490鈥?30 (2005) CrossRef
    4. Damg氓rd, I., Jurik, M.: A generalisation, a simplification and some applications of paillier鈥檚 probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol.聽1992, pp. 119鈥?36. Springer, Heidelberg (2001) CrossRef
    5. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory聽31(4), 469鈥?72 (1985) CrossRef
    6. Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)
    7. Johnson, W., Lindenstrauss, J.: Extensions of lipschitz mappings into a hilbert space. Contemporary Mathematics聽26(189-206), 1 (1984)
    8. Kenthapadi, K., Korolova, A., Mironov, I., Mishra, N.: Privacy via the johnson-lindenstrauss transform. arXiv preprint arXiv:1204.2606 (2012)
    9. Mell, P., Grance, T.: Draft nist working definition of cloud computing. Referenced on June 3, vol. 15 (2009)
    10. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.聽1592, pp. 223鈥?38. Springer, Heidelberg (1999) CrossRef
    11. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Computing聽16(1), 69鈥?3 (2012) CrossRef
    12. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Foundations of Secure Computation聽32(4), 169鈥?78 (1978)
    13. Zheng, P., Huang, J.: Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In: Proceedings of the 19th ACM International Conference on Multimedia, pp. 413鈥?22. ACM (2011)
    14. Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain (2013)
    15. Zheng, P., Huang, J.: Walsh-hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol.聽7692, pp. 240鈥?54. Springer, Heidelberg (2013) CrossRef
  • 作者单位:Xianjun Hu (17)
    Weiming Zhang (17)
    Honggang Hu (17)
    Nenghai Yu (17)

    17. Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China, Hefei, China, 230027
  • ISSN:1611-3349
文摘
Signal processing in the encrypted domain becomes a desired technique to protect privacy of outsourced data in cloud. In this paper we propose a double-cipher scheme to implement non-local means denoising in encrypted images. In this scheme, one ciphertext is generated by Paillier scheme which enables the mean-filter, and the other is obtained by a privacy-preserving transform which enables the non-local searching. By the privacy-preserving transform, the cloud can search the similar pixel blocks in the ciphertexts with the same speed as in the plaintexts, so the proposed method can be fast executed. The experimental results show that the quality of denoised images in the encrypted domain is comparable to that obtained in plain domain.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700