This
archive includes a C++ prototype implementation of encrypted
domain fast Fourier transform (e-FFT) based on Paillier
homomorphic cryptosystem [1]. Both radix-2 and radix-4
decimation in time versions are provided. If you find the code
useful, please cite the following reference:
[1] T.Bianchi, A.Piva, M.Barni, "On the Implementation of the
Discrete Fourier Transform in the Encrypted Domain", IEEE
Transactions on Information Forensics and Security, vol. 4,
no. 1, Mar. 2009, pp. 86-97.
This
archive includes a C++ prototype implementation of encrypted
domain discrete cosine transform (e-DCT) based on Paillier
homomorphic cryptosystem [1]. It provides both standard and
fast (based on Hou's algorithm) DCT-II and DCT-III. The
archive also includes routines for composite representation
[2] and a demo applying encrypted domain 8x8 block DCT/fast
DCT using both standard and composite representations. If you
find the code useful, please cite the following references:
[1] T.Bianchi, A.Piva, M.Barni, "Encrypted Domain DCT based on
Homomorphic Cryptosystems", EURASIP Journal on
Information Security, vol. 2009, no. Article ID
716357, 2009, pp. 12 pages.
[2] T.Bianchi, A.Piva, M.Barni, "Composite Signal
Representation for Fast and Storage-Efficient Processing of
Encrypted Signals", IEEE Transactions on Information
Forensics and Security, vol. 5, no. 1, March
2010, pp. 180-187.
This
archive includes a C++ demo implementation of encrypted domain
watermark embedding based on Paillier homomorphic cryptosystem
and composite representation [1]. Different watermarking
schemes (QIM, DC-QIM, RDM) and different encrypted domain
embedding strategies are considered. If you find the code
useful, please cite the following reference:
[1] M.Deng, T.Bianchi, A.Piva, B.Preneel, "Efficient
implementation of a buyer-seller watermarking protocol using a
composite signal representation", Proceedings of the
First International Workshop on Signal Processing in the
EncryptEd Domain (SPEED 2009), Lausanne, Switzerland,
Sept. 2009.
This
archive includes a prototype implementation of client-side
spread transform dither modulation (ST-DM) based on look-up
tables [1]. It provides three java applications implementing
the three entities required by the client-side watermarking
protocol: the Server, the Client, and the Trusted Third Party.
A simple demo script show how to run the three entities to
perform system setup, encryption, client-side joint decryption
and watermarking, watermark detection. If you find the code
useful, please cite the following reference:
[1] A. Piva, T. Bianchi, A. De Rosa, "Secure Client-Side ST-DM
Watermark Embedding", IEEE Transactions on Information
Forensics and Security, vol. 5, no. 1, March
2010, pp. 13-26.