[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Towards integrating image encryption with compression: A survey
As digital images are consistently generated and transmitted online, the unauthorized
utilization of these images is an increasing concern that has a significant impact on both …
utilization of these images is an increasing concern that has a significant impact on both …
Image encryption: Generating visually meaningful encrypted images
To protect image contents, most existing encryption algorithms are designed to transform an
original image into a texture-like or noise-like image which is, however, an obvious visual …
original image into a texture-like or noise-like image which is, however, an obvious visual …
Pixel-based image encryption without key management for privacy-preserving deep neural networks
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …
enables us not to only apply images without visual information to DNNs but to also consider …
On the security of permutation-only image encryption schemes
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes,
and many permutation-only algorithms have been proposed in recent years for the …
and many permutation-only algorithms have been proposed in recent years for the …
Robust coding of encrypted images via 2D compressed sensing
B Zhang, D **ao, Y **ang - IEEE Transactions on Multimedia, 2020 - ieeexplore.ieee.org
In many practical scenarios, image encryption should be implemented before image
compression. This leads to the requirement of compressing encrypted images. Compressed …
compression. This leads to the requirement of compressing encrypted images. Compressed …
Development of the method for encoding service data in crypto-compression image representation systems
The demand for image confidentiality is constantly growing. At the same time, ensuring the
confidentiality of video information must be organized subject to ensuring its reliability with a …
confidentiality of video information must be organized subject to ensuring its reliability with a …
Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
Perceptual encryption (PE) hides the identifiable information of an image in such a way that
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to …
Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding
YG Yang, BW Guan, J Li, D Li, YH Zhou… - Optics & Laser …, 2019 - Elsevier
An image compression-encryption scheme is proposed based on fractional order hyper-
chaotic systems combined with 2D compressed sensing (CS) and DNA encoding. This …
chaotic systems combined with 2D compressed sensing (CS) and DNA encoding. This …