{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:22Z","timestamp":1750220962055,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T00:00:00Z","timestamp":1567209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1636201 and 61572452"],"award-info":[{"award-number":["U1636201 and 61572452"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Initiative in Quantum Information Technologies","award":["AHY150400"],"award-info":[{"award-number":["AHY150400"]}]},{"name":"CAS-TWAS President's Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,8,31]]},"abstract":"<jats:p>Due to its large storage facility and high-end computing capability, cloud computing has received great attention as a huge amount of personal multimedia data and computationally expensive tasks can be outsourced to the cloud. However, the cloud being third-party semi-trusted, is prone to information leakage, raising privacy risks. Signal processing in the encrypted domain has emerged as a new research paradigm on privacy-preserving processing over outsourced data by semi-trusted cloud. In this article, we propose a solution for non-integer mean value computation in the homomorphic encrypted domain without any interactive protocol between the client and the service provider. Using the proposed solution, various image processing operations, such as local smoothing filter, un-sharp masking, and histogram equalization, can be performed in the encrypted domain at the cloud server without any privacy concerns. Our experimental results from standard test images reveal that these image processing operations can be performed without pre-processing, without client-server interactive protocol, and without any error between the encrypted domain and the plain domain.<\/jats:p>","DOI":"10.1145\/3325194","type":"journal-article","created":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T14:22:21Z","timestamp":1568298141000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations"],"prefix":"10.1145","volume":"15","author":[{"given":"Mohsin","family":"Shah","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"given":"Honggang","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]}],"member":"320","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Adobe. {n.d.}. Adobe Creative Cloud. Retrieved from https:\/\/www.adobe.com\/creativecloud.html.  Adobe. {n.d.}. Adobe Creative Cloud. Retrieved from https:\/\/www.adobe.com\/creativecloud.html."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0398-5"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2907328.2907475"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2011087"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2036230"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/1967798"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486551"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"volume-title":"Mathematics of Public Key Cryptography","author":"Galbraith Steven D.","key":"e_1_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139012843"},{"key":"e_1_2_1_10_1","unstructured":"Carl Friedrich Gauss. 1966. Disquisitiones Arithmeticae. Vol. 157. Yale University Press.  Carl Friedrich Gauss. 1966. Disquisitiones Arithmeticae. Vol. 157. Yale University Press."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008697"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"volume-title":"Silverman","year":"1998","author":"Hoffstein Jeffrey","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","first-page":"864","article-title":"Encryption performance improvements of the paillier cryptosystem","volume":"2015","author":"Jost Christine","year":"2015","journal-title":"IACR Cryptol."},{"volume-title":"The Art of Computer Programming","author":"Knuth Donald E.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"e_1_2_1_17_1","unstructured":"Joseph Louis Lagrange. 1775. Recherches d\u2019arithmetique. C. F. Voss.  Joseph Louis Lagrange. 1775. Recherches d\u2019arithmetique. C. F. Voss."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656205"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_2_1_20_1","first-page":"7","article-title":"The NIST definition of cloud computing","volume":"800","author":"Mell Peter","year":"2011","journal-title":"NIST Spec. Publ."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2585085"},{"volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo (ICME\u201913)","author":"Mohanty Manoranjan","key":"e_1_2_1_22_1"},{"volume-title":"Nguyen and Jacques Stern","year":"2001","author":"Phong","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_25_1","unstructured":"PIXLR. {n.d.}. PIXLR Editor. Retrieved from https:\/\/pixlr.com\/editor\/.  PIXLR. {n.d.}. PIXLR Editor. Retrieved from https:\/\/pixlr.com\/editor\/."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756187"},{"volume-title":"197: Advanced encryption standard (AES). Fed. Info. Process. Stand.ards Publ. 197, 441","year":"2001","author":"Pub NIST FIPS","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5729-7"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_2_1_30_1","first-page":"8","article-title":"Factoring via strong lattice reduction algorithms","volume":"1997","author":"Ritter Harald","year":"1997","journal-title":"IACR Cryptol."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3354-4"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4906-4"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228533"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36373-3_16"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2253474"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860550"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:16Z","timestamp":1750204456000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325194"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,31]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8,31]]}},"alternative-id":["10.1145\/3325194"],"URL":"https:\/\/doi.org\/10.1145\/3325194","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2019,8,31]]},"assertion":[{"value":"2018-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}