2011
DOI: 10.1016/j.optcom.2011.05.079
|View full text |Cite
|
Sign up to set email alerts
|

Application of homomorphism to secure image sharing

Abstract: In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Machine learning algorithms based on deep Neural Networks (NN) have attracted attention as a breakthrough in the advance of artificial intelligence (AI) and are the mainstream in current AI research. These techniques are achieving remarkable results and are extensively used for analyzing big data in a variety of domains such as spam detection, traffic analysis, intrusion detection, medical or genomics predictions, face recognition, and financial predictions [9,10,24,27,32,38,44,54]. However, training the models requires access to the raw data which is often privacy sensitive and can create potential privacy risks.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning algorithms based on deep Neural Networks (NN) have attracted attention as a breakthrough in the advance of artificial intelligence (AI) and are the mainstream in current AI research. These techniques are achieving remarkable results and are extensively used for analyzing big data in a variety of domains such as spam detection, traffic analysis, intrusion detection, medical or genomics predictions, face recognition, and financial predictions [9,10,24,27,32,38,44,54]. However, training the models requires access to the raw data which is often privacy sensitive and can create potential privacy risks.…”
Section: Introductionmentioning
confidence: 99%
“…Suppose that the distributions of the two phase masks after kth iteration are ψ k 1 and ψ k 2 , respectively, then in the (k + 1)-th iteration process they can be described as [27] The Lagrange interpolating polynomial is the basis of (t, n) threshold secret sharing algorithm. A polynomial f about x of degree t− 1 is usually written as follows: [42][43][44][45][46]…”
Section: Iterative Phase Retrieval Algorithmmentioning
confidence: 99%
“…Machine Learning (ML) models have attracted global adulation and are used in a plethora of applications such as medical diagnosis, pattern recognition, and credit risk assessment. Recently, deep learning -a sub-field of ML has gained extra attention from researchers due to its solid performance in many tasks such as speech recognition, spam detection, image classification, traffic analysis, face recognition, financial detection and genomics prediction [1]- [5]. ML models normally consist of a training and a testing phase.…”
Section: Introductionmentioning
confidence: 99%