{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:50:50Z","timestamp":1767923450929,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T00:00:00Z","timestamp":1557446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,10]]},"DOI":"10.1145\/3330393.3330407","type":"proceedings-article","created":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T12:50:44Z","timestamp":1562071844000},"page":"158-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Implementation and Analysis of Homomorphic Facial Image Encryption and Manipulation"],"prefix":"10.1145","author":[{"given":"Aldrich Ellis C.","family":"Asuncion","sequence":"first","affiliation":[{"name":"Ateneo de Manila University, Quezon City, Philippines"}]},{"given":"Brian Christopher T.","family":"Guadalupe","sequence":"additional","affiliation":[{"name":"Ateneo de Manila University, Quezon City, Philippines"}]},{"given":"William Emmanuel S.","family":"Yu","sequence":"additional","affiliation":[{"name":"Ateneo de Manila University, Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bio cryptography and Efficient Encryption Algorithms. Mobile Networks and Applications (May","author":"Murugan Chinnandi Arul","year":"2018","unstructured":"Chinnandi Arul Murugan and P. KarthigaiKumar . 2018. Survey on Image Encryption Schemes , Bio cryptography and Efficient Encryption Algorithms. Mobile Networks and Applications (May 2018 ). Chinnandi Arul Murugan and P. KarthigaiKumar. 2018. Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms. Mobile Networks and Applications (May 2018)."},{"key":"e_1_3_2_1_2_1","first-page":"7","article-title":"Image Encryption Schemes: A Complete Survey. International Journal of Signal Processing","volume":"9","author":"Jain Yamini","year":"2016","unstructured":"Yamini Jain , Ritesh Bansal , Gaurav Sharma , Bhuvnesh Kumar , and Shailender Gupta . 2016 . Image Encryption Schemes: A Complete Survey. International Journal of Signal Processing , Image Processing and Pattern Recognition 9 , 7 (July 2016), 157--192. Yamini Jain, Ritesh Bansal, Gaurav Sharma, Bhuvnesh Kumar, and Shailender Gupta. 2016. Image Encryption Schemes: A Complete Survey. International Journal of Signal Processing, Image Processing and Pattern Recognition 9, 7 (July 2016), 157--192.","journal-title":"Image Processing and Pattern Recognition"},{"key":"e_1_3_2_1_3_1","volume-title":"Dolendro Singh Laiphrakpam, and Tuithung Themrichon","author":"Khoirom Motilal Singh","year":"2018","unstructured":"Motilal Singh Khoirom , Dolendro Singh Laiphrakpam, and Tuithung Themrichon . 2018 . Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik 168 (April 2018), 370--375. Motilal Singh Khoirom, Dolendro Singh Laiphrakpam, and Tuithung Themrichon. 2018. Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik 168 (April 2018), 370--375."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2907333.2907524"},{"key":"e_1_3_2_1_5_1","volume-title":"Homomorphic Encryption: Theory and Application. In Theory and Practice of Cryptography and Network Security Protocols and Technologies, Jaydip Sen (Ed.). InTech.","author":"Sen Jaydip","year":"2013","unstructured":"Jaydip Sen . 2013 . Homomorphic Encryption: Theory and Application. In Theory and Practice of Cryptography and Network Security Protocols and Technologies, Jaydip Sen (Ed.). InTech. Jaydip Sen. 2013. Homomorphic Encryption: Theory and Application. In Theory and Practice of Cryptography and Network Security Protocols and Technologies, Jaydip Sen (Ed.). InTech."},{"key":"e_1_3_2_1_6_1","volume-title":"CryptoImg: Privacy Preserving Processing Over Encrypted Images. arXiv:1609.00881 {cs} (Sept","author":"Ziad M. Tarek Ibn","year":"2016","unstructured":"M. Tarek Ibn Ziad , Amr Alanwar , Moustafa Alzantot , and Mani Srivastava . 2016. CryptoImg: Privacy Preserving Processing Over Encrypted Images. arXiv:1609.00881 {cs} (Sept . 2016 ). http:\/\/arxiv.org\/abs\/1609.00881 arXiv: 1609.00881 M. Tarek Ibn Ziad, Amr Alanwar, Moustafa Alzantot, and Mani Srivastava. 2016. CryptoImg: Privacy Preserving Processing Over Encrypted Images. arXiv:1609.00881 {cs} (Sept. 2016). http:\/\/arxiv.org\/abs\/1609.00881 arXiv: 1609.00881"},{"key":"e_1_3_2_1_7_1","volume-title":"Woods","author":"Gonzalez Rafael C.","year":"2008","unstructured":"Rafael C. Gonzalez and Richard E . Woods . 2008 . Digital Image Processing (3rd ed.). Prentice Hall , Upper Saddle River, NJ. Rafael C. Gonzalez and Richard E. Woods. 2008. Digital Image Processing (3rd ed.). Prentice Hall, Upper Saddle River, NJ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"e_1_3_2_1_10_1","volume-title":"Illumination Processing in Face Recognition","author":"Li Yongping","unstructured":"Yongping Li , Chao Wang , and Xinyu Ao. 2010. Illumination Processing in Face Recognition . In Face Recognition, Milos Oravec (Ed.). InTech . Yongping Li, Chao Wang, and Xinyu Ao. 2010. Illumination Processing in Face Recognition. In Face Recognition, Milos Oravec (Ed.). InTech."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.020"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.12.03"},{"key":"e_1_3_2_1_13_1","volume-title":"Encyclopedia of Cryptography and Security, Henk C","author":"Bauer Friedrich L.","unstructured":"Friedrich L. Bauer . 2005. Cryptosystem . In Encyclopedia of Cryptography and Security, Henk C . A. van Tilborg (Ed.). Springer US , 119. Friedrich L. Bauer. 2005. Cryptosystem. In Encyclopedia of Cryptography and Security, Henk C. A. van Tilborg (Ed.). Springer US, 119."},{"key":"e_1_3_2_1_14_1","volume-title":"Advances in Cryptology--- EUROCRYPT '99, Jacques Stern (Ed.).","author":"Paillier Pascal","unstructured":"Pascal Paillier . 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes . In Advances in Cryptology--- EUROCRYPT '99, Jacques Stern (Ed.). Vol. 1592 . Springer Berlin Heidelberg , Berlin\/ Heidelberg , 223--238. Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology--- EUROCRYPT '99, Jacques Stern (Ed.). Vol. 1592. Springer Berlin Heidelberg, Berlin\/Heidelberg, 223--238."},{"key":"e_1_3_2_1_15_1","volume-title":"Efficient and Secure Comparison for On-Line Auctions","author":"Damg\u00e5rd Ivan","unstructured":"Ivan Damg\u00e5rd , Martin Geisler , and Mikkel Kr\u00f8igaard . 2007. Efficient and Secure Comparison for On-Line Auctions . In Information Security and Privacy, Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson (Eds.). Vol. 4586 . Springer Berlin Heidelberg , Berlin\/ Heidelberg , 416--430. Ivan Damg\u00e5rd, Martin Geisler, and Mikkel Kr\u00f8igaard. 2007. Efficient and Secure Comparison for On-Line Auctions. In Information Security and Privacy, Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson (Eds.). Vol. 4586. Springer Berlin Heidelberg, Berlin\/Heidelberg, 416--430."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412624"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986373"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 19th Philippine Computing Science Congress (PCSC","author":"Asuncion Aldrich Ellis","year":"2019","unstructured":"Aldrich Ellis Asuncion , Brian Christopher Guadalupe , and William Emmanuel Yu . 2019 . Privacy-Preserving Approximation of Transcendental Functions . In Proceedings of the 19th Philippine Computing Science Congress (PCSC 2019), 30--37. Computing Society of the Philippines. Aldrich Ellis Asuncion, Brian Christopher Guadalupe, and William Emmanuel Yu. 2019. Privacy-Preserving Approximation of Transcendental Functions. In Proceedings of the 19th Philippine Computing Science Congress (PCSC 2019), 30--37. Computing Society of the Philippines."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_1_22_1","unstructured":"Alberto Ibarrondo Laurent Gomez and Melek Onen. 2018. PYthon For Homomorphic Encryption Libraries. https:\/\/github.com\/ibarrond\/Pyfhel.  Alberto Ibarrondo Laurent Gomez and Melek Onen. 2018. PYthon For Homomorphic Encryption Libraries. https:\/\/github.com\/ibarrond\/Pyfhel."},{"key":"e_1_3_2_1_23_1","volume-title":"The OpenCV Library. Dr. Dobb's Journal of Software Tools","author":"Bradski G.","year":"2000","unstructured":"G. Bradski . 2000. The OpenCV Library. Dr. Dobb's Journal of Software Tools ( 2000 ). G. Bradski. 2000. The OpenCV Library. Dr. Dobb's Journal of Software Tools (2000)."},{"key":"e_1_3_2_1_24_1","first-page":"04","article-title":"Efficiency Analysis and Security Evaluation of Image Encryption Schemes","volume":"12","author":"Ahmad Jawad","year":"2012","unstructured":"Jawad Ahmad and Fawad Ahmed . 2012 . Efficiency Analysis and Security Evaluation of Image Encryption Schemes . International Journal of Video & Image Processing and Network Security 12 , 04 (Aug. 2012), 18--31. Jawad Ahmad and Fawad Ahmed. 2012. Efficiency Analysis and Security Evaluation of Image Encryption Schemes. International Journal of Video & Image Processing and Network Security 12, 04 (Aug. 2012), 18--31.","journal-title":"International Journal of Video & Image Processing and Network Security"},{"key":"e_1_3_2_1_25_1","article-title":"NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology","author":"Wu Yue","year":"2011","unstructured":"Yue Wu , Joseph Noonan , and Sos Agaian . 2011 . NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology , Journal of Selected Areas in Telecommunications (JSAT) ( April 2011), 31--38. Yue Wu, Joseph Noonan, and Sos Agaian. 2011. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) (April 2011), 31--38.","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"e_1_3_2_1_26_1","volume-title":"scikit-image: image processing in Python. PeerJ 2 (6","author":"van der Walt St\u00e9fan","year":"2014","unstructured":"St\u00e9fan van der Walt , Johannes L. Sch\u00f6nberger , Juan Nunez-Iglesias , Fran\u00e7ois Boulogne , Joshua D. Warner , Neil Yager , Emmanuelle Gouillart , Tony Yu , and the scikit-image contributors. 2014. scikit-image: image processing in Python. PeerJ 2 (6 2014 ), e453. St\u00e9fan van der Walt, Johannes L. Sch\u00f6nberger, Juan Nunez-Iglesias, Fran\u00e7ois Boulogne, Joshua D. Warner, Neil Yager, Emmanuelle Gouillart, Tony Yu, and the scikit-image contributors. 2014. scikit-image: image processing in Python. PeerJ 2 (6 2014), e453."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9351-x"},{"key":"e_1_3_2_1_28_1","volume-title":"2009 IEEE 12th International Conference on Computer Vision. IEEE, Kyoto, 1639--1646","author":"Upmanyu M.","unstructured":"M. Upmanyu , A.M. Namboodiri , K. Srinathan , and C.V. Jawahar . 2009. Efficient privacy preserving video surveillance . In 2009 IEEE 12th International Conference on Computer Vision. IEEE, Kyoto, 1639--1646 . M. Upmanyu, A.M. Namboodiri, K. Srinathan, and C.V. Jawahar. 2009. Efficient privacy preserving video surveillance. In 2009 IEEE 12th International Conference on Computer Vision. IEEE, Kyoto, 1639--1646."},{"key":"e_1_3_2_1_29_1","volume-title":"Digital Video Concepts, Methods, and Metrics","author":"Akramullah Shahriar","unstructured":"Shahriar Akramullah . 2014. Video Quality Metrics . In Digital Video Concepts, Methods, and Metrics . Apress , Berkeley, CA , 101--160. Shahriar Akramullah. 2014. Video Quality Metrics. In Digital Video Concepts, Methods, and Metrics. Apress, Berkeley, CA, 101--160."}],"event":{"name":"ICMSSP 2019: 2019 4th International Conference on Multimedia Systems and Signal Processing","location":"Guangzhou China","acronym":"ICMSSP 2019","sponsor":["Shenzhen University Shenzhen University","Sun Yat-Sen University"]},"container-title":["Proceedings of the 2019 4th International Conference on Multimedia Systems and Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3330393.3330407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3330393.3330407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:26Z","timestamp":1750204406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3330393.3330407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,10]]},"references-count":27,"alternative-id":["10.1145\/3330393.3330407","10.1145\/3330393"],"URL":"https:\/\/doi.org\/10.1145\/3330393.3330407","relation":{},"subject":[],"published":{"date-parts":[[2019,5,10]]},"assertion":[{"value":"2019-05-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}