Homomorphic encryption systems statement: Trends and challenges
For securing our own systems, encryption got the major interest, especially when talking
about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we …
about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we …
Cryptodl: Deep neural networks over encrypted data
Machine learning algorithms based on deep neural networks have achieved remarkable
results and are being extensively used in different domains. However, the machine learning …
results and are being extensively used in different domains. However, the machine learning …
Privacy-preserving machine learning as a service
Machine learning algorithms based on deep Neural Networks (NN) have achieved
remarkable results and are being extensively used in different domains. On the other hand …
remarkable results and are being extensively used in different domains. On the other hand …
An efficient homomorphic medical image encryption algorithm for cloud storage security
AM Vengadapurvaja, G Nisha, R Aarthy… - Procedia computer …, 2017 - Elsevier
Abstract The Health Information Technology for Economic and clinical Health (HITECH) Act
of 2009 encourages the use of Electronic Health Records. EHR improves the data …
of 2009 encourages the use of Electronic Health Records. EHR improves the data …
Privacy-preserving machine learning in cloud
Machine learning algorithms based on deep neural networks (NN) have achieved
remarkable results and are being extensively used in different domains. On the other hand …
remarkable results and are being extensively used in different domains. On the other hand …
Enhancing image processing architecture using deep learning for embedded vision systems
R Udendhran, M Balamurugan, A Suresh… - Microprocessors and …, 2020 - Elsevier
In recent years, the success and capabilities of embedded vision have showed up in
embedded applications. The embedding of vision into electronic devices such as embedded …
embedded applications. The embedding of vision into electronic devices such as embedded …
Blind faith: Privacy-preserving machine learning using function approximation
Over the past few years, a tremendous growth of machine learning was brought about by a
significant increase in adoption of cloud-based services. As a result, various solutions have …
significant increase in adoption of cloud-based services. As a result, various solutions have …
Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography
An optical multilevel authentication method is proposed that is based on the singular value
decomposition ghost imaging (SVDGI) and (t, n) threshold secret sharing scheme. SVDGI …
decomposition ghost imaging (SVDGI) and (t, n) threshold secret sharing scheme. SVDGI …
A secure image sharing scheme with high quality stego-images based on steganography
Image sharing can be utilized to protect important commercial, military or private images
against a single point of failure. Many existing image sharing schemes may have one or …
against a single point of failure. Many existing image sharing schemes may have one or …
Homomorphic encryption: Review and applications
R Challa - Advances in Data Science and Management …, 2020 - Springer
In a recent decade, homomorphic encryption became more popular because of its special
properties. Homomorphic encryption is identified to be the key candidate for providing …
properties. Homomorphic encryption is identified to be the key candidate for providing …