[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

A novel hybrid image encryption–compression scheme by combining chaos theory and number theory

I Ahmad, S Shin - Signal Processing: Image Communication, 2021 - Elsevier
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …

Block-wise image transformation with secret key for adversarially robust defense

MM AprilPyone, H Kiya - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this paper, we propose a novel defensive transformation that enables us to maintain a
high classification accuracy under the use of both clean images and adversarial examples …

Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain

W Sirichotedumrong, T Maekawa… - … on Image Processing …, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs for both training and …

Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

I Ahmad, W Choi, S Shin - Sensors, 2023 - mdpi.com
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …

Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks

H Ito, Y Kinoshita, M Aprilpyone, H Kiya - IEEE Access, 2021 - ieeexplore.ieee.org
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …

Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems

W Sirichotedumrong, H Kiya - APSIPA Transactions on Signal and …, 2019 - cambridge.org
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …

Bitstream-based JPEG image encryption with file-size preserving

H Kobayashi, H Kiya - 2018 IEEE 7th Global Conference on …, 2018 - ieeexplore.ieee.org
An encryption scheme of JPEG images in the bitstream domain is proposed. The proposed
scheme preserves the JPEG format even after encrypting the images, and the file size of …

Recompression of JPEG crypto-compressed images without a key

V Itier, P Puteaux, W Puech - … on Circuits and Systems for Video …, 2019 - ieeexplore.ieee.org
The rising popularity of social networks and cloud computing has greatly increased a
number of JPEG compressed image exchanges. In this context, the security of the …