{"id":"https://openalex.org/W2955273252","doi":"https://doi.org/10.1145/3330393.3330407","title":"Implementation and Analysis of Homomorphic Facial Image Encryption and Manipulation","display_name":"Implementation and Analysis of Homomorphic Facial Image Encryption and Manipulation","publication_year":2019,"publication_date":"2019-05-10","ids":{"openalex":"https://openalex.org/W2955273252","doi":"https://doi.org/10.1145/3330393.3330407","mag":"2955273252"},"language":"en","primary_location":{"id":"doi:10.1145/3330393.3330407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3330393.3330407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 4th International Conference on Multimedia Systems and Signal Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057912851","display_name":"Aldrich Ellis C. Asuncion","orcid":"https://orcid.org/0009-0000-6439-4959"},"institutions":[{"id":"https://openalex.org/I19722","display_name":"Ateneo de Manila University","ror":"https://ror.org/053kevk63","country_code":"PH","type":"education","lineage":["https://openalex.org/I19722"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Aldrich Ellis C. Asuncion","raw_affiliation_strings":["Ateneo de Manila University, Quezon City, Philippines"],"affiliations":[{"raw_affiliation_string":"Ateneo de Manila University, Quezon City, Philippines","institution_ids":["https://openalex.org/I19722"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083801890","display_name":"Brian Christopher T. Guadalupe","orcid":null},"institutions":[{"id":"https://openalex.org/I19722","display_name":"Ateneo de Manila University","ror":"https://ror.org/053kevk63","country_code":"PH","type":"education","lineage":["https://openalex.org/I19722"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Brian Christopher T. Guadalupe","raw_affiliation_strings":["Ateneo de Manila University, Quezon City, Philippines"],"affiliations":[{"raw_affiliation_string":"Ateneo de Manila University, Quezon City, Philippines","institution_ids":["https://openalex.org/I19722"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032773955","display_name":"William Emmanuel S. Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I19722","display_name":"Ateneo de Manila University","ror":"https://ror.org/053kevk63","country_code":"PH","type":"education","lineage":["https://openalex.org/I19722"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"William Emmanuel S. Yu","raw_affiliation_strings":["Ateneo de Manila University, Quezon City, Philippines"],"affiliations":[{"raw_affiliation_string":"Ateneo de Manila University, Quezon City, Philippines","institution_ids":["https://openalex.org/I19722"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057912851"],"corresponding_institution_ids":["https://openalex.org/I19722"],"apc_list":null,"apc_paid":null,"fwci":0.3037,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59593636,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"158","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9599000215530396},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.8397767543792725},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7991262078285217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7403927445411682},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6437711715698242},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5913718342781067},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.48626482486724854},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.4585430920124054},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34561455249786377},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.33867859840393066},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3385252356529236},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32587575912475586},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.28621190786361694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2860352396965027},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.07874047756195068}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9599000215530396},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.8397767543792725},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7991262078285217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7403927445411682},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6437711715698242},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5913718342781067},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.48626482486724854},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.4585430920124054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34561455249786377},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33867859840393066},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3385252356529236},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32587575912475586},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.28621190786361694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2860352396965027},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.07874047756195068}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3330393.3330407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3330393.3330407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 4th International Conference on Multimedia Systems and Signal Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311731","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W179458199","https://openalex.org/W236632755","https://openalex.org/W341391756","https://openalex.org/W1536822098","https://openalex.org/W1581827225","https://openalex.org/W1819119697","https://openalex.org/W2004362160","https://openalex.org/W2015159529","https://openalex.org/W2041841839","https://openalex.org/W2068143382","https://openalex.org/W2132172731","https://openalex.org/W2138451337","https://openalex.org/W2398715209","https://openalex.org/W2500262796","https://openalex.org/W2534300788","https://openalex.org/W2534838589","https://openalex.org/W2559727410","https://openalex.org/W2737298818","https://openalex.org/W2799847377","https://openalex.org/W2802026902","https://openalex.org/W2930840158","https://openalex.org/W2950345987","https://openalex.org/W3014734376","https://openalex.org/W3143388522","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4401608539","https://openalex.org/W4238582915","https://openalex.org/W4390887375","https://openalex.org/W4316659877","https://openalex.org/W1575311728","https://openalex.org/W2518050971","https://openalex.org/W4226147778","https://openalex.org/W4254717201","https://openalex.org/W3004852542"],"abstract_inverted_index":{"Homomorphic":[0],"cryptography":[1,35],"allows":[2],"for":[3,39,72,125],"encrypted":[4],"data":[5,54],"to":[6,49,52,96,101,136,139],"be":[7,123],"operated":[8],"on":[9],"securely":[10],"without":[11],"requiring":[12],"decryption.":[13],"Current":[14],"homomorphic":[15,34],"cryptosystems":[16,71,116],"are":[17,25,117],"either":[18],"limited":[19],"in":[20,41,119],"their":[21,50,88],"permitted":[22],"operations":[23],"or":[24],"significantly":[26],"more":[27],"time-intensive":[28],"than":[29],"standard":[30],"non-homomorphic":[31],"cryptosystems.":[32],"Regardless,":[33],"has":[36],"been":[37],"targeted":[38],"use":[40],"secure":[42],"image":[43,74,104,126],"processing":[44,75,105],"and":[45,68,86,91,114,121],"facial":[46,73],"recognition,":[47],"due":[48],"ability":[51],"maintain":[53],"privacy.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59,99],"assessed":[60],"the":[61,64,112,130],"viability":[62],"of":[63],"Paillier,":[65],"Damg\u00e5rd--Geisler--Kr\u00f8igaard":[66],"(DGK),":[67],"Brakerski--Gentry--Vaikuntanathan":[69],"(BGV)":[70],"applications,":[76],"by":[77],"implementing":[78],"a":[79],"software":[80],"library":[81],"equipped":[82],"with":[83],"these":[84],"cryptosystems,":[85],"comparing":[87],"time":[89],"efficiency":[90],"accuracy.":[92],"As":[93],"an":[94],"extension":[95],"previous":[97],"research,":[98],"attempt":[100],"support":[102],"non-linear":[103],"operations.":[106],"Preliminary":[107],"results":[108],"have":[109],"shown":[110],"that":[111],"Paillier":[113,131],"DGK":[115],"comparable":[118],"accuracy":[120],"may":[122],"used":[124],"negation,":[127],"but":[128],"only":[129],"cryptosystem":[132],"is":[133],"consistent":[134],"enough":[135],"produce":[137],"reasonable":[138],"accurate":[140],"results.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
