[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
A novel hybrid image encryption–compression scheme by combining chaos theory and number theory
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …
The order in which the two operations are carried out affects the overall efficiency of digital …
Block-wise image transformation with secret key for adversarially robust defense
In this paper, we propose a novel defensive transformation that enables us to maintain a
high classification accuracy under the use of both clean images and adversarial examples …
high classification accuracy under the use of both clean images and adversarial examples …
Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain
W Sirichotedumrong, T Maekawa… - … on Image Processing …, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs for both training and …
enables us not to only apply images without visual information to DNNs for both training and …
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …
Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …
to enhance security, but also to improve the compression performance for Encryption-then …
Bitstream-based JPEG image encryption with file-size preserving
An encryption scheme of JPEG images in the bitstream domain is proposed. The proposed
scheme preserves the JPEG format even after encrypting the images, and the file size of …
scheme preserves the JPEG format even after encrypting the images, and the file size of …
Recompression of JPEG crypto-compressed images without a key
The rising popularity of social networks and cloud computing has greatly increased a
number of JPEG compressed image exchanges. In this context, the security of the …
number of JPEG compressed image exchanges. In this context, the security of the …