This archive includes a C++ prototype implementation of encrypted domain fast Fourier transform (e-FFT) based on Paillier homomorphic cryptosystem [1]. Both radix-2 and radix-4 decimation in time versions are provided. If you find the code useful, please cite the following reference:
[1] T.Bianchi, A.Piva, M.Barni, "On the Implementation of the Discrete Fourier Transform in the Encrypted Domain", IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, Mar. 2009, pp. 86-97.
e-DCT.rar
This archive includes a C++ prototype implementation of encrypted domain discrete cosine transform (e-DCT) based on Paillier homomorphic cryptosystem [1]. It provides both standard and fast (based on Hou's algorithm) DCT-II and DCT-III. The archive also includes routines for composite representation [2] and a demo applying encrypted domain 8x8 block DCT/fast DCT using both standard and composite representations. If you find the code useful, please cite the following references:
[1] T.Bianchi, A.Piva, M.Barni, "Encrypted Domain DCT based on Homomorphic Cryptosystems", EURASIP Journal on Information Security, vol. 2009, no. Article ID 716357, 2009, pp. 12 pages.
[2] T.Bianchi, A.Piva, M.Barni, "Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals", IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, March 2010, pp. 180-187.
ECoMark.rar
This archive includes a C++ demo implementation of encrypted domain watermark embedding based on Paillier homomorphic cryptosystem and composite representation [1]. Different watermarking schemes (QIM, DC-QIM, RDM) and different encrypted domain embedding strategies are considered. If you find the code useful, please cite the following reference:
[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, "Efficient implementation of a buyer-seller watermarking protocol using a composite signal representation", Proceedings of the First International Workshop on Signal Processing in the EncryptEd Domain (SPEED 2009), Lausanne, Switzerland, Sept. 2009.
stdmMark.rar
This archive includes a prototype implementation of client-side spread transform dither modulation (ST-DM) based on look-up tables [1]. It provides three java applications implementing the three entities required by the client-side watermarking protocol: the Server, the Client, and the Trusted Third Party. A simple demo script show how to run the three entities to perform system setup, encryption, client-side joint decryption and watermarking, watermark detection. If you find the code useful, please cite the following reference:
[1] A. Piva, T. Bianchi, A. De Rosa, "Secure Client-Side ST-DM Watermark Embedding", IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, March 2010, pp. 13-26.