Homomorphic encryption systems statement: Trends and challenges

B Alaya, L Laouamer, N Msilini - Computer Science Review, 2020 - Elsevier
For securing our own systems, encryption got the major interest, especially when talking
about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we …

Cryptodl: Deep neural networks over encrypted data

E Hesamifard, H Takabi, M Ghasemi - arxiv preprint arxiv:1711.05189, 2017 - arxiv.org
Machine learning algorithms based on deep neural networks have achieved remarkable
results and are being extensively used in different domains. However, the machine learning …

Privacy-preserving machine learning as a service

E Hesamifard, H Takabi, M Ghasemi… - Proceedings on Privacy …, 2018 - petsymposium.org
Machine learning algorithms based on deep Neural Networks (NN) have achieved
remarkable results and are being extensively used in different domains. On the other hand …

An efficient homomorphic medical image encryption algorithm for cloud storage security

AM Vengadapurvaja, G Nisha, R Aarthy… - Procedia computer …, 2017 - Elsevier
Abstract The Health Information Technology for Economic and clinical Health (HITECH) Act
of 2009 encourages the use of Electronic Health Records. EHR improves the data …

Privacy-preserving machine learning in cloud

E Hesamifard, H Takabi, M Ghasemi… - Proceedings of the 2017 …, 2017 - dl.acm.org
Machine learning algorithms based on deep neural networks (NN) have achieved
remarkable results and are being extensively used in different domains. On the other hand …

Enhancing image processing architecture using deep learning for embedded vision systems

R Udendhran, M Balamurugan, A Suresh… - Microprocessors and …, 2020 - Elsevier
In recent years, the success and capabilities of embedded vision have showed up in
embedded applications. The embedding of vision into electronic devices such as embedded …

Blind faith: Privacy-preserving machine learning using function approximation

T Khan, A Bakas, A Michalas - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Over the past few years, a tremendous growth of machine learning was brought about by a
significant increase in adoption of cloud-based services. As a result, various solutions have …

Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography

X Liu, X Meng, Y Wang, H Wu, X Yang, W He… - Optics and Lasers in …, 2021 - Elsevier
An optical multilevel authentication method is proposed that is based on the singular value
decomposition ghost imaging (SVDGI) and (t, n) threshold secret sharing scheme. SVDGI …

A secure image sharing scheme with high quality stego-images based on steganography

J He, W Lan, S Tang - Multimedia Tools and Applications, 2017 - Springer
Image sharing can be utilized to protect important commercial, military or private images
against a single point of failure. Many existing image sharing schemes may have one or …

Homomorphic encryption: Review and applications

R Challa - Advances in Data Science and Management …, 2020 - Springer
In a recent decade, homomorphic encryption became more popular because of its special
properties. Homomorphic encryption is identified to be the key candidate for providing …