Paper
10 February 2011 Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem
N. Islam, W. Puech, R. Brouzet
Author Affiliations +
Proceedings Volume 7880, Media Watermarking, Security, and Forensics III; 788004 (2011) https://doi.org/10.1117/12.873319
Event: IS&T/SPIE Electronic Imaging, 2011, San Francisco Airport, California, United States
Abstract
Multiplicative homomorphic properties of a cryptosystem can be used in various applications requiring security, protection and authentication e.g. digital fingerprinting, electronic voting, on line betting etc. Secret sharing between two or more parties exploiting multiplicative homomorphic property of RSA results into erroneous blocks while extracting the message. The generation of these erroneous blocks limits the capabilities of homomorphic properties of RSA to be used in its full extend. This paper provides three different approaches as solutions to the problem of erroneous blocks in image. These solutions are: mean value approach, shortest distance approach and image preprocessing approach. It has been observed that shortest distance approach results into good PSNR but it is computationally expensive. The best approach with high PSNR is image preprocessing approach before sharing process, which results into no erroneous blocks in the extracted image, thus no extra extraction techniques are required.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
N. Islam, W. Puech, and R. Brouzet "Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem", Proc. SPIE 7880, Media Watermarking, Security, and Forensics III, 788004 (10 February 2011); https://doi.org/10.1117/12.873319
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Feature extraction

Image processing

Computer security

Data storage

Image quality

Receivers

Back to Top