|
|
|
|
LEADER |
01000naa a22002652 4500 |
001 |
NLM226131319 |
003 |
DE-627 |
005 |
20231224070737.0 |
007 |
cr uuu---uuuuu |
008 |
231224s2013 xx |||||o 00| ||eng c |
028 |
5 |
2 |
|a pubmed24n0753.xml
|
035 |
|
|
|a (DE-627)NLM226131319
|
035 |
|
|
|a (NLM)23529086
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Zheng, Peijia
|e verfasserin
|4 aut
|
245 |
1 |
0 |
|a Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain
|
264 |
|
1 |
|c 2013
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ƒaComputermedien
|b c
|2 rdamedia
|
338 |
|
|
|a ƒa Online-Ressource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Date Completed 30.12.2013
|
500 |
|
|
|a Date Revised 02.07.2013
|
500 |
|
|
|a published: Print
|
500 |
|
|
|a Citation Status PubMed-not-MEDLINE
|
520 |
|
|
|a Signal processing in the encrypted domain is a new technology with the goal of protecting valuable signals from insecure signal processing. In this paper, we propose a method for implementing discrete wavelet transform (DWT) and multiresolution analysis (MRA) in homomorphic encrypted domain. We first suggest a framework for performing DWT and inverse DWT (IDWT) in the encrypted domain, then conduct an analysis of data expansion and quantization errors under the framework. To solve the problem of data expansion, which may be very important in practical applications, we present a method for reducing data expansion in the case that both DWT and IDWT are performed. With the proposed method, multilevel DWT/IDWT can be performed with less data expansion in homomorphic encrypted domain. We propose a new signal processing procedure, where the multiplicative inverse method is employed as the last step to limit the data expansion. Taking a 2-D Haar wavelet transform as an example, we conduct a few experiments to demonstrate the advantages of our method in secure image processing. We also provide computational complexity analyses and comparisons. To the best of our knowledge, there has been no report on the implementation of DWT and MRA in the encrypted domain
|
650 |
|
4 |
|a Journal Article
|
700 |
1 |
|
|a Huang, Jiwu
|e verfasserin
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
|d 1992
|g 22(2013), 6 vom: 17. Juni, Seite 2455-68
|w (DE-627)NLM09821456X
|x 1941-0042
|7 nnns
|
773 |
1 |
8 |
|g volume:22
|g year:2013
|g number:6
|g day:17
|g month:06
|g pages:2455-68
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_NLM
|
912 |
|
|
|a GBV_ILN_350
|
951 |
|
|
|a AR
|
952 |
|
|
|d 22
|j 2013
|e 6
|b 17
|c 06
|h 2455-68
|