A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
Privacy-preserving image classification using vision transformer
In this paper, we propose a privacy-preserving image classification method that is based on
the combined use of encrypted images and the vision transformer (ViT). The proposed …
the combined use of encrypted images and the vision transformer (ViT). The proposed …
A privacy-preserving machine learning scheme using etc images
We propose a privacy-preserving machine learning scheme with encryption-then-
compression (EtC) images, where EtC images are images encrypted by using a block-based …
compression (EtC) images, where EtC images are images encrypted by using a block-based …
Privacy-preserving color image feature extraction by quaternion discrete orthogonal moments
To implement image storage and computation in cloud servers without violating users'
privacy, privacy-preserving feature extraction has been a new research interest. The existing …
privacy, privacy-preserving feature extraction has been a new research interest. The existing …
An Automatic Privacy‐Aware Framework for Text Data in Online Social Network Based on a Multi‐Deep Learning Model
With the increasing severity of user privacy leaks in online social networks (OSNs), existing
privacy protection technologies have difficulty meeting the diverse privacy protection needs …
privacy protection technologies have difficulty meeting the diverse privacy protection needs …
Entropy-based face recognition and spoof detection for security applications
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly
important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is …
important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is …
A Privacy-Preserving Evolutionary Computation Framework for Feature Selection
Feature selection is a crucial process in data science that involves selecting the most
effective subset of features. Evolutionary computation (EC) is one of the most commonly …
effective subset of features. Evolutionary computation (EC) is one of the most commonly …
Accurate image-based pedestrian detection with privacy preservation
In this paper, we propose an accurate pedestrian detection scheme with privacy
preservation (PPPD) based on pedestrian images. By utilizing the vector homomorphic …
preservation (PPPD) based on pedestrian images. By utilizing the vector homomorphic …
Image feature extraction in encrypted domain with privacy-preserving Hahn moments
With outsourcing huge amount of images to cloud, it can reduce the local storage and
computational overhead of resource-limited users, but the security concerns still impede the …
computational overhead of resource-limited users, but the security concerns still impede the …
HOG feature extraction from encrypted images for privacy-preserving machine learning
M Kitayama, H Kiya - … on Consumer Electronics-Asia (ICCE-Asia …, 2019 - ieeexplore.ieee.org
In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients)
features from encryption-then-compression (EtC) images for privacy-preserving machine …
features from encryption-then-compression (EtC) images for privacy-preserving machine …