[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …
applications. Image transformation with a secret key enables us not only to protect visual …
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …
Survey on JPEG compatible joint image compression and encryption algorithms
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …
images on Internet are compressed, and JPEG is the most widely adopted standards for …
Pixel-based image encryption without key management for privacy-preserving deep neural networks
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …
enables us not to only apply images without visual information to DNNs but to also consider …
Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain
W Sirichotedumrong, T Maekawa… - … on Image Processing …, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs for both training and …
enables us not to only apply images without visual information to DNNs for both training and …
Data gathering algorithm for children's observation system: For realizing real-time performance in information terminal bus stop
MS Tanaka - … 15th IEEE Annual Consumer Communications & …, 2018 - ieeexplore.ieee.org
In this paper, we propose a data gathering algorithm for children's observation system which
enhances anonymity of data and enhances security and has advanced security function to …
enhances anonymity of data and enhances security and has advanced security function to …
Development of the method for encoding service data in crypto-compression image representation systems
The demand for image confidentiality is constantly growing. At the same time, ensuring the
confidentiality of video information must be organized subject to ensuring its reliability with a …
confidentiality of video information must be organized subject to ensuring its reliability with a …
A gan-based image transformation scheme for privacy-preserving deep neural networks
We propose a novel image transformation scheme using generative adversarial networks
(GANs) for privacy-preserving deep neural networks (DNNs). The proposed scheme …
(GANs) for privacy-preserving deep neural networks (DNNs). The proposed scheme …
Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …
to enhance security, but also to improve the compression performance for Encryption-then …
An encryption-then-compression system for lossless image compression standards
In many multimedia applications, image encryption has to be conducted prior to image
compression. This letter proposes an Encryption-then-Compression system using JPEG …
compression. This letter proposes an Encryption-then-Compression system using JPEG …