[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

Towards integrating image encryption with compression: A survey

KN Singh, AK Singh - ACM Transactions on Multimedia Computing …, 2022 - dl.acm.org
As digital images are consistently generated and transmitted online, the unauthorized
utilization of these images is an increasing concern that has a significant impact on both …

Image encryption: Generating visually meaningful encrypted images

L Bao, Y Zhou - Information Sciences, 2015 - Elsevier
To protect image contents, most existing encryption algorithms are designed to transform an
original image into a texture-like or noise-like image which is, however, an obvious visual …

Pixel-based image encryption without key management for privacy-preserving deep neural networks

W Sirichotedumrong, Y Kinoshita, H Kiya - Ieee Access, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …

On the security of permutation-only image encryption schemes

A Jolfaei, XW Wu… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes,
and many permutation-only algorithms have been proposed in recent years for the …

Robust coding of encrypted images via 2D compressed sensing

B Zhang, D **ao, Y **ang - IEEE Transactions on Multimedia, 2020 - ieeexplore.ieee.org
In many practical scenarios, image encryption should be implemented before image
compression. This leads to the requirement of compressing encrypted images. Compressed …

Development of the method for encoding service data in crypto-compression image representation systems

V Barannik, S Sidchenko, N Barannik… - … -European Journal of …, 2021 - papers.ssrn.com
The demand for image confidentiality is constantly growing. At the same time, ensuring the
confidentiality of video information must be organized subject to ensuring its reliability with a …

Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives

I Ahmad, W Choi, S Shin - Sensors, 2023 - mdpi.com
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …

Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding

YG Yang, BW Guan, J Li, D Li, YH Zhou… - Optics & Laser …, 2019 - Elsevier
An image compression-encryption scheme is proposed based on fractional order hyper-
chaotic systems combined with 2D compressed sensing (CS) and DNA encoding. This …