{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:31:02Z","timestamp":1773156662695,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031972591","type":"print"},{"value":"9783031972607","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_1","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:21:00Z","timestamp":1752470460000},"page":"3-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Convolution-Friendly Image Compression with\u00a0FHE"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4598-8265","authenticated-orcid":false,"given":"Axel","family":"Mertens","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3240-9009","authenticated-orcid":false,"given":"Georgio","family":"Nicolas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8440-9345","authenticated-orcid":false,"given":"Sergi","family":"Rovira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"1_CR1","unstructured":"Alexandru, A., Kim, A., Polyakov, Y.: General functional bootstrapping using CKKS. Cryptology ePrint Archive, Paper 2024\/1623 (2024). https:\/\/eprint.iacr.org\/2024\/1623"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Almohammad, A., Ghinea, G., Hierons, R.M.: JPEG steganography: a performance evaluation of quantization tables. In: 2009 International Conference on Advanced Information Networking and Applications, pp. 471\u2013478 (2009). https:\/\/doi.org\/10.1109\/AINA.2009.67","DOI":"10.1109\/AINA.2009.67"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Balla, S., Koushanfar, F.: Heliks: HE linear algebra kernels for secure inference. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, 26\u201330 November 2023, pp. 2306\u20132320. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3623136","DOI":"10.1145\/3576915.3623136"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bergerat, L., Chillotti, I., Ligier, D., Orfila, J.B., Tap, S.: TFHE gets real: an efficient and flexible homomorphic floating-point arithmetic. Cryptology ePrint Archive, Paper 2025\/257 (2025). https:\/\/eprint.iacr.org\/2025\/257","DOI":"10.46586\/tches.v2025.i2.126-162"},{"key":"1_CR5","unstructured":"Boneh, D., Grotto, A.J., McDaniel, P., Papernot, N.: Preparing for the age of deepfakes and disinformation. HAI Policy Brief (2020)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS 2012, pp. 309\u2013325. ACM (2012). https:\/\/doi.org\/10.1145\/2090236.2090262","DOI":"10.1145\/2090236.2090262"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Lattice-based FHE as secure as PKE. In: Naor, M. (ed.) ITCS 2014, pp. 1\u201312. ACM (2014). https:\/\/doi.org\/10.1145\/2554797.2554799","DOI":"10.1145\/2554797.2554799"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Canard, S., Carpov, S., Kuate, D.N., Sirdey, R.: Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE. Cryptology ePrint Archive, Report 2017\/392 (2017). https:\/\/eprint.iacr.org\/2017\/392","DOI":"10.1109\/PST.2017.00041"},{"key":"1_CR10","unstructured":"Chao, J., et al.: Carenets: compact and resource-efficient CNN for homomorphic inference on encrypted medical images. CoRR abs\/1901.10074 (2019). http:\/\/arxiv.org\/abs\/1901.10074"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53887-6_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"I Chillotti","year":"2016","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 3\u201333. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1"},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2019","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2019). https:\/\/doi.org\/10.1007\/s00145-019-09319-x","journal-title":"J. Cryptol."},{"key":"1_CR14","unstructured":"Datta, T., Boneh, D.: Using ZK proofs to fight disinformation (2022). https:\/\/medium.com\/@boneh\/using-zk-proofs-to-fight-disinformation-17e7d57fe52f"},{"key":"1_CR15","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Report 2012\/144 (2012). https:\/\/eprint.iacr.org\/2012\/144"},{"key":"1_CR16","unstructured":"Fleischhacker, N., Larsen, K.G., Simkin, M.: Compressing encrypted data over small fields. Cryptology ePrint Archive, Paper 2023\/946 (2023). https:\/\/eprint.iacr.org\/2023\/946"},{"key":"1_CR17","unstructured":"Fu, W., Lin, R., Inge, D.: Fully homomorphic image processing. CoRR abs\/1810.03249 (2018). http:\/\/arxiv.org\/abs\/1810.03249"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) 41st ACM STOC, pp. 169\u2013178. ACM Press (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Golomb, S.: Run-length encodings (corresp.). IEEE Trans. Inf. Theory 12(3), 399\u2013401 (1966). https:\/\/doi.org\/10.1109\/TIT.1966.1053907","DOI":"10.1109\/TIT.1966.1053907"},{"issue":"9","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1952","unstructured":"Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098\u20131101 (1952). https:\/\/doi.org\/10.1109\/JRPROC.1952.273898","journal-title":"Proc. IRE"},{"key":"1_CR21","unstructured":"International Organisation for Standardisation: Information technology \u2013 Digital compression and coding of continuous-tone still images - Requirements and guidelines. Standard, CCITT, Geneva, CH (1992)"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Jain, N., Nandakumar, K., Ratha, N.K., Pankanti, S., Kumar, U.: Optimizing homomorphic encryption based secure image analytics. In: 23rd International Workshop on Multimedia Signal Processing, MMSP 2021, Tampere, Finland, 6\u20138 October 2021, pp.\u00a01\u20136. IEEE (2021). https:\/\/doi.org\/10.1109\/MMSP53017.2021.9733620","DOI":"10.1109\/MMSP53017.2021.9733620"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Jiang, X., Kim, M., Lauter, K.E., Song, Y.: Secure outsourced matrix computation and application to neural networks. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1209\u20131222. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243837","DOI":"10.1145\/3243734.3243837"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-45661-9_21","volume-title":"Fast Software Encryption","author":"J Kelsey","year":"2002","unstructured":"Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263\u2013276. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45661-9_21"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-00434-7_6","volume-title":"Cryptology and Network Security","author":"D Nokam Kuate","year":"2018","unstructured":"Nokam Kuate, D., Canard, S., Sirdey, R.: Towards video compression in the encrypted domain: a case-study on the H264 and HEVC macroblock processing pipeline. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 109\u2013129. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00434-7_6"},{"key":"1_CR26","unstructured":"Lee, E., et al.: Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In: Chaudhuri, K., Jegelka, S., Song, L., Szepesv\u00e1ri, C., Niu, G., Sabato, S. (eds.) International Conference on Machine Learning, ICML 2022, 17-23 July 2022, Baltimore, Maryland, USA. Proceedings of Machine Learning Research, vol.\u00a0162, pp. 12403\u201312422. PMLR (2022). https:\/\/proceedings.mlr.press\/v162\/lee22e.html"},{"key":"1_CR27","doi-asserted-by":"publisher","unstructured":"Ma, X., Liu, C., Cao, S., Zhu, B.: JPEG decompression in the homomorphic encryption domain. In: Boll, S., et al. (eds.) 2018 ACM Multimedia Conference on Multimedia Conference, MM 2018, Seoul, Republic of Korea, 22\u201326 October 2018, pp. 905\u2013913. ACM (2018). https:\/\/doi.org\/10.1145\/3240508.3240672","DOI":"10.1145\/3240508.3240672"},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Nithya, P., Sathya, M., Vengattaraman, T.: Survey on image compression algorithms and their efficiencies under different types of files. In: 2023 6th International Conference on Recent Trends in Advance Computing (ICRTAC), pp. 238\u2013246 (2023). https:\/\/doi.org\/10.1109\/ICRTAC59277.2023.10480806","DOI":"10.1109\/ICRTAC59277.2023.10480806"},{"key":"1_CR29","unstructured":"Pennebaker, W.B., Mitchell, J.L.: JPEG still image data compression standard. Van Nostrand Reinhold, New York (N.Y.) (1993)"},{"key":"1_CR30","doi-asserted-by":"publisher","unstructured":"Rovida, L., Leporati, A.: Encrypted image classification with low memory footprint using fully homomorphic encryption. Int. J. Neural Syst. 34(5), 2450025:1\u20132450025:16 (2024). https:\/\/doi.org\/10.1142\/S0129065724500254","DOI":"10.1142\/S0129065724500254"},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Vengadapurvaja, A., Nisha, G., Aarthy, R., Sasikaladevi, N.: An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput. Sci. 115, 643\u2013650 (2017). https:\/\/doi.org\/10.1016\/j.procs.2017.09.150. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050917319798, 7th International Conference on Advances in Computing & Communications, ICACC-2017, 22-24 August 2017, Cochin, India","DOI":"10.1016\/j.procs.2017.09.150"},{"key":"1_CR32","doi-asserted-by":"publisher","unstructured":"Wang, Z., Simoncelli, E., Bovik, A.: Multiscale structural similarity for image quality assessment. In: The Thirty-Seventh Asilomar Conference on Signals, Systems & Computers, vol.\u00a02, pp. 1398\u20131402 (2003). https:\/\/doi.org\/10.1109\/ACSSC.2003.1292216","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"1_CR33","unstructured":"Zama: Image filtering on encrypted data using fully homomorphic encryption (2023). https:\/\/huggingface.co\/spaces\/zama-fhe\/encrypted_image_filtering"},{"key":"1_CR34","doi-asserted-by":"publisher","unstructured":"Zheng, P., Huang, J.: An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Jaimes, A., et al. (eds.) ACM Multimedia Conference, MM 2013, Barcelona, Spain, 21\u201325 October 2013, pp. 803\u2013812. ACM (2013). https:\/\/doi.org\/10.1145\/2502081.2502105","DOI":"10.1145\/2502081.2502105"},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Zinner, T., Hohlfeld, O., Abboud, O., Hossfeld, T.: Impact of frame rate and resolution on objective QoE metrics. In: 2010 Second International Workshop on Quality of Multimedia Experience (QoMEX), pp. 29\u201334 (2010). https:\/\/doi.org\/10.1109\/QOMEX.2010.5518277","DOI":"10.1109\/QOMEX.2010.5518277"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:21:04Z","timestamp":1752470464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}