Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 7695751, 11 pages
https://doi.org/10.1155/2017/7695751
Research Article

An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service

School of Electronics and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China

Correspondence should be addressed to Xiaolin Gui; nc.ude.utjx.liam@iuglx

Received 30 April 2016; Revised 26 January 2017; Accepted 26 March 2017; Published 14 May 2017

Academic Editor: Zonghua Zhang

Copyright © 2017 Pan Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Sunil P. Khatri, Kyle Loyka, and He Zhou, “A homomorphic encryption scheme based on affine transforms,” Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI, pp. 51–56, 2018. View at Publisher · View at Google Scholar
  • Mbarek Marwan, Ali Kartit, and Hassan Ouahmane, “Using Homomorphic Encryption in Cloud-Based Medical Image Processing: Opportunities and Challenges,” Innovations in Smart Cities and Applications, vol. 37, pp. 824–835, 2018. View at Publisher · View at Google Scholar
  • K. Shankar, S.K. Lakshmanaprabu, Deepak Gupta, Ashish Khanna, and Victor Hugo C. de Albuquerque, “Adaptive optimal multi key based encryption for digital image security,” Concurrency and Computation: Practice and Experience, pp. e5122, 2018. View at Publisher · View at Google Scholar
  • Ahmet Fatih Mustacoglu, and Ferhat Özgür Çatak, “CPP-ELM: Cryptographically privacy-preserving extreme learning machine for cloud systems,” International Journal of Computational Intelligence Systems, vol. 11, no. 1, pp. 33–44, 2018. View at Publisher · View at Google Scholar
  • Jian An, He Yang, Xiaolin Gui, Wendong Zhang, Ruowei Gui, and Jingjing Kang, “TCNS: Node Selection With Privacy Protection in Crowdsensing Based on Twice Consensuses of Blockchain,” IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 1255–1267, 2019. View at Publisher · View at Google Scholar
  • Vishruti Kakkad, Meshwa Patel, and Manan Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019. View at Publisher · View at Google Scholar