[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images

P Puteaux, W Puech - IEEE transactions on information …, 2018 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an effective technique to embed data
in the encrypted domain. An original image is encrypted with a secret key and during or after …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

Reversible data hiding in encrypted images with distributed source encoding

Z Qian, X Zhang - IEEE Transactions on Circuits and Systems …, 2015 - ieeexplore.ieee.org
This paper proposes a novel scheme of reversible data hiding in encrypted images using
distributed source coding. After the original image is encrypted by the content owner using a …

Order-preserving symmetric encryption

A Boldyreva, N Chenette, Y Lee, A O'neill - Advances in Cryptology …, 2009 - Springer
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …

Content based image retrieval using deep learning process

RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …

Privacy-preserving face recognition

Z Erkin, M Franz, J Guajardo, S Katzenbeisser… - … Symposium, PETS 2009 …, 2009 - Springer
Face recognition is increasingly deployed as a means to unobtrusively verify the identity of
people. The widespread use of biometrics raises important privacy concerns, in particular if …

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

RL Lagendijk, Z Erkin, M Barni - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …

Hawkes processes for events in social media

MA Rizoiu, Y Lee, S Mishra, L **e - Frontiers of multimedia research, 2017 - dl.acm.org
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …