2019
DOI: 10.1109/tifs.2018.2881677
|View full text |Cite
|
Sign up to set email alerts
|

Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images

Abstract: A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit images through an untrusted channel provider, such as social network service providers. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the conventional scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
145
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 193 publications
(145 citation statements)
references
References 30 publications
0
145
0
Order By: Relevance
“…Compared with full encryption with provable security like homomorphic encryption (HE), they generally have a low computational cost and can offer encrypted data robust against various kinds of noise and errors. In addition, some of them aim to consider both security and efficient compression so that they can be adapted to cloud storage and network sharing [9][10][11][12][13][14][15]. However, with the exception of a few previous pieces of work, most conventional perceptual encryption methods have never been considered for application to machine learning algorithms [5,6].…”
Section: Visual Information Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with full encryption with provable security like homomorphic encryption (HE), they generally have a low computational cost and can offer encrypted data robust against various kinds of noise and errors. In addition, some of them aim to consider both security and efficient compression so that they can be adapted to cloud storage and network sharing [9][10][11][12][13][14][15]. However, with the exception of a few previous pieces of work, most conventional perceptual encryption methods have never been considered for application to machine learning algorithms [5,6].…”
Section: Visual Information Protectionmentioning
confidence: 99%
“…p is the pixel value of the original image with L bit per pixel. The value of the occurrence probability P (r(i)) = 0.5 is used to invert bits randomly [13]. 3) (Optional) Shuffle three color components of each pixel by using an integer randomly selected from six integers generated by a key Ks as shown in Table 1.…”
Section: Random Integermentioning
confidence: 99%
“…p is the pixel value of the original image with L bit per pixel. The value of the occurrence probability P (r(j)) = 0.5 is used to invert bits randomly [13]. 3) (Optional) Shuffle three color components of each pixel by using an integer randomly selected from six integers generated by a key K s,i as shown in Table I.…”
Section: Security Evaluation Of Pixel-based Image Encryptionmentioning
confidence: 99%
“…While there is an extensive literature on using traditional image compression codecs to provide security along with compression, (e.g., see [12][13][14][15]), an important limitation arises with these approaches when they are used in largescales and possibly for domain-specific images. Since in such scenarios images have similar encoding (e.g., high concentration of activation of DCT coefficients at certain regions), the adversary can benefit from this to infer the statistics of encoded images.…”
Section: Introductionmentioning
confidence: 99%