Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. T. Bianchi, A. Piva, and M. Barni, “Encrypted domain DCT based on homomorphic cryptosystems,” EURASIP J. Multimedia Inf. Security, vol. 2009, pp. 1:1–1:12, Jan. 2009. [Online].Available:http://jis.eurasipjournals.springeropen.co m/article s/10.1155/2009/716357
    2. X. Sun and S. Bo, “A blind digital watermarking for color medical images based on PCA,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, Beijing, China, Jun. 2010, pp. 421–427.
    3. J. Yuan, S. Yu, and L. Guo, “SEISA: Secure and efficient encrypted image search with access control,” in Proc. IEEE Conf. Comput. Commun., Apr./May 2015, pp. 2083–2091
    4. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology, vol. 1592. Springer, 1999, pp. 223–238
    5. S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270–299, Apr. 1984
    6. J. Benaloh and D. Tuinstra, “Receipt-free secret-ballot elections (extended abstract),” in Proc. 26th Annu. ACM Symp. Theory Comput., 1994, pp. 544–553.
    7. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
    8. T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 196. Berlin, Germany: Springer-Verlag, 1984,pp. 10–18.
    9. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symp. Security Privacy, May 2000, pp. 44–55.
    10. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology, vol. 3027. Springer, 2004, pp. 506–522.
    11. P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security, vol. 3089. Springer, 2004, pp. 31–45.
    12. M. Mohanty, W. T. Ooi, and P. K. Atrey, “Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing,” in Proc. IEEE Int. Conf. Multimedia Expo, San Jose, CA, USA, Jul. 2013, pp. 1–6.
    13. K. Kansal, M. Mohanty, and P. K. Atrey, “Scaling and cropping of wavelet-based compressed images in hidden domain,” in MultiMedia Modeling (Lecture Notes in Computer Science), vol. 8935. Springer, 2015, pp. 430– 441.
    14. M. Mohanty, M. R. Asghar and G. Russello, " 2DCrypt : Image Scaling and Cropping in Encrypted Domains," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2542-2555, Nov. 2016.
    15. Mrs. Jadhav Rohini , Prof. S. A. Kahate , “A Survey on: A Modified Paillier Cryptosystem-Based Image Scaling and Cropping Scheme”, IJARIIE-ISSN(O)-2395-4396 3225 www, Vol-2 Issue-5 2016
    16. Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz, “Performance Analysis of Different Cryptography Algorithms”, ISSN: 2277 128X, Volume 6, Issue 3, March 2016.

Recent Article