[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
An improved DWT-SVD domain watermarking for medical information security
Exchange of patient record over network required a technique to guarantee security and
privacy for tele-health services. This paper presents an improved watermarking technique …
privacy for tele-health services. This paper presents an improved watermarking technique …
Towards integrating image encryption with compression: A survey
As digital images are consistently generated and transmitted online, the unauthorized
utilization of these images is an increasing concern that has a significant impact on both …
utilization of these images is an increasing concern that has a significant impact on both …
Survey on JPEG compatible joint image compression and encryption algorithms
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …
images on Internet are compressed, and JPEG is the most widely adopted standards for …
Anteater: When arnold's cat meets langton's ant to encrypt images
With the proliferation of digital images over open networks, secure and efficient encryption
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …
F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption
People are accustomed to utilizing mobile phones to capture images and uploading them to
the cloud due to various incomparable advantages such as saving the storage space on the …
the cloud due to various incomparable advantages such as saving the storage space on the …
An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios
C Wang, L Song - Information Sciences, 2023 - Elsevier
In this paper, we propose a novel image encryption scheme based on a chaotic system and
compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …
compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …
Pixel-based image encryption without key management for privacy-preserving deep neural networks
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …
enables us not to only apply images without visual information to DNNs but to also consider …
An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
A novel hybrid image encryption–compression scheme by combining chaos theory and number theory
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …
The order in which the two operations are carried out affects the overall efficiency of digital …