A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
A homomorphic neural network for modeling and prediction
Neural Computation
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
Information Security and Cryptology
A light weight buyer-seller watermarking protocol
Advances in Multimedia
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A Homomorphic Method for Sharing Secret Images
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Adaptive color image watermarking based on a modified improved pixel-wise masking technique
Computers and Electrical Engineering
On the implementation of the discrete Fourier transform in the encrypted domain
IEEE Transactions on Information Forensics and Security
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Encrypted domain DCT based on homomorphic cryptosystems
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
IEEE Communications Letters
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
International Journal of Information and Computer Security
A novel DRM framework for peer-to-peer music content delivery
Journal of Systems and Software
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
Bandwidth efficient asymmetric fingerprinting scheme
International Journal of Communication Systems
Bandwidth efficient buyer-seller watermarking protocol
International Journal of Information and Computer Security
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Reversible data hiding in encrypted images using pseudorandom sequence modulation
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Broadcast monitoring protocol based on secure watermark embedding
Computers and Electrical Engineering
Hi-index | 0.01 |
Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.