2019 IEEE International Conference on Image Processing (ICIP) 2019
DOI: 10.1109/icip.2019.8803431
|View full text |Cite
|
Sign up to set email alerts
|

An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services

Abstract: We propose an image identification scheme for double-compressed encrypted JPEG images that aims to identify encrypted JPEG images that are generated from an original JPEG image. To store images without any visual sensitive information on photo sharing services, encrypted JPEG images are generated by using a block-scramblingbased encryption method that has been proposed for Encryptionthen-Compression systems with JPEG compression. In addition, feature vectors robust against JPEG compression are extracted from e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…An EtC system is used in such scenarios, although the traditional way of securely transmitting images is to use a compression-then-encryption (CtE) system. Compressible encryption methods have been applied to privacy-preserving compression, data hiding, and image retrieval [28]- [30] in cloud environments. In addition, visually protected images have been demonstrated to be effective in fake image detection [31] and various learning algorithms [10], [32]- [37].…”
Section: Copyright Cmentioning
confidence: 99%
“…An EtC system is used in such scenarios, although the traditional way of securely transmitting images is to use a compression-then-encryption (CtE) system. Compressible encryption methods have been applied to privacy-preserving compression, data hiding, and image retrieval [28]- [30] in cloud environments. In addition, visually protected images have been demonstrated to be effective in fake image detection [31] and various learning algorithms [10], [32]- [37].…”
Section: Copyright Cmentioning
confidence: 99%
“…The authors in [53] determined some parameters that can be used in order to resist such manipulations. Similarly, photo-sharing schemes based on an extended algorithm of the Color CPE and of the PGS-CPE were proposed in [54,55] and [56], respectively. The main advantage of the schemes was the identification of images re-encrypted with different keys.…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
“…However, there is the possibility of data leakage and unauthorized use by service providers because they are not trusted in general. Therefore, various privacy-preserving image identification [10] and retrieval [1]- [9] and processing schemes [11], [12] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, it is required for image identification and retrieval on cloud services that the schemes have robustness against the image compression [1]- [3], [10], [13]. This is because images are generally uploaded and stored in a compressed form to reduce the amount of data.…”
Section: Introductionmentioning
confidence: 99%