2009
DOI: 10.1155/2009/841045
|View full text |Cite
|
Sign up to set email alerts
|

One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…Ito & Kiya (2009) presented an image matching algorithm using phase-only correlation (POC) in the frequency domain. This algorithm preserves the visual privacy of the images in a template database.…”
Section: Secure Processingmentioning
confidence: 99%
“…Ito & Kiya (2009) presented an image matching algorithm using phase-only correlation (POC) in the frequency domain. This algorithm preserves the visual privacy of the images in a template database.…”
Section: Secure Processingmentioning
confidence: 99%
“…Various methods have been proposed for privacy-preserving computation. The methods are classified into two types: perceptual encryption-based [5][6][7][8][9][10][11][12][13][14][15][16] and homomorphic encryption (HE)based [17][18][19][20][21][22][23][24]. As described in Section 2, HE-based methods are the most secure options for privacy preserving computation, but they This work was partially supported by Grant-in-Aid for Scientific Research(B), No.17H03267, from the Japan Society for the Promotion Science.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, data augmentation has to be done before encryption. In contrast, perceptual encryption-based methods have been seeking a trade-off in security to enable other requirements, such as a low processing demand, bitstream compliance, and signal processing in the encrypted domain [5][6][7][8][9][10][11][12][13][14][15][16]. A few methods were applied to machine learning algorithms in previous works [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…For securing multimedia data, full encryption with a state-of-the-art cipher (like RSA, AES, etc) is the most secure option. However, many multimedia applications have been seeking a trade-off in security to enable other requirements, e.g., low processing demands, retaining bitstream compliance, and signal process ing in the encrypted domain, so a lot of perceptual encryptions have been studied as one of schemes for achieving the trade off [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%