Filters








524 Hits in 3.9 sec

Transparent Image Encryption Using Progressive JPEG [chapter]

Thomas Stütz, Andreas Uhl
2006 Lecture Notes in Computer Science  
This paper investigates how transparent encryption can be realized through selective encryption of the progressive JPEG modes.  ...  Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption).  ...  Conclusions Progressive and hierarchical JPEG may be used for transparent encryption in an efficient manner due to the scalable data format.  ... 
doi:10.1007/11836810_21 fatcat:j6yaprgbkvhsnnuj7px4o4owim

Efficient visual secret sharing scheme for color images

Shyong Jian Shyu
2006 Pattern Recognition  
However, most imaging applications including digital photography, archiving and internet communications nowadays use images in the JPEG compressed format.  ...  In this paper we propose a shared key algorithm that works directly in the JPEG domain, thus enabling shared key image encryption for a variety of applications.  ...  For the progressive-DCT JPEG encoding, the proposed encryption scheme applies directly. Once the shares are created, the progressive-DCT based scans could be applied to generate two JPEG shares.  ... 
doi:10.1016/j.patcog.2005.06.010 fatcat:ukj3pc5yg5hltir4ebtayo7id4

A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images

Stefan Jenisch, Andreas Uhl
2014 EURASIP Journal on Information Security  
JPEG XR is the most recent still image coding standard, and custom security features for this format are required for fast adoption of the standard.  ...  This paper proposes, discusses, and evaluates a set of format-compliant encryption methods for the JPEG XR standard: coefficient scan order permutation, sign bit encryption, transform-based encryption,  ...  This allows for a low-quality preview image during transmission similar to progressive JPEG.  ... 
doi:10.1186/1687-417x-2014-6 fatcat:m4piivmwczenllnwle5ikt7ima

Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms

Tan, Zhao
2019 Symmetry  
The experimental results show that the watermarking image encrypted by this method not only has good transparency, but also has strong anti-brightness/contrast attack, anti-shearing, and anti-noise performance  ...  image in the time domain to achieve the effect of encryption.  ...  Therefore, JPEG images are widely used in web design. At present, lossless compression coding is the dominant coding scheme for symmetrically encrypted digital watermarking image.  ... 
doi:10.3390/sym11121505 fatcat:u5irqdiatzduxhcwqbqd2pkhay

Designing Secure and Survivable Stegosystems
English

S.K. Pal, P.K. Saxena, S. K. Muttoo
2006 Defence Science Journal  
Secure Schemes for JPEG Images JPEG is today one of the most popular coding formats for still images.  ...  A large number of schemes based on manipulation of the JPEG coefficients were used for hiding data in images 9 .  ... 
doi:10.14429/dsj.56.1886 fatcat:ltbcoqfo7bexljjlihc2udy6ge

A new blockchain-based trusted DRM scheme for built-in content protection

Ma Zhaofeng, Huang Weihua, Gao Hongmin
2018 EURASIP Journal on Image and Video Processing  
In the transparence of watermark, HVS and Watson models are used to control the watermark strength, which can enhance the invisibility.  ...  In the scheme, we use image Arnold transform to enhance the security and use image DCT coefficients of middle frequency to embed watermark for robustness.  ...  We scramble the binary image using Arnold transform for security and then convert the encrypted image into one-dimensional image sequence and then use logistic mapping to encrypt the one-dimensional sequence  ... 
doi:10.1186/s13640-018-0327-1 fatcat:rn5ndqxfnjhvnlbesm4m5umg2a

Transparent hashing in the encrypted domain for privacy preserving image retrieval

Kannan Karthik, Sachin Kashyap
2013 Signal, Image and Video Processing  
To facilitate this, the encryption process must remain transparent to specific image statistics computed in the spatial or transform domain.  ...  Search through a database of encrypted images against a crumpled and encrypted query will remain privacy preserving only if comparisons between selective features derived from these images is executed  ...  Most of the architectures developed for privacy preserving search and retrieval engines for images use encrypted feature sets or specific feature transparent multimedia encryption schemes. 2 Related literature  ... 
doi:10.1007/s11760-013-0471-0 fatcat:5gvr6jryarha5f74mtwvvjvcym

Framework for Visual Cryptographic based Encryption and Decryption

Saumya Awasthi, Ajay Pratap, Romesh Srivastava
2017 International Journal of Computer Applications  
In this paper, main focus is on the development of an encryption-decryption framework using some object oriented language and its development.  ...  Target image is converted into black & white image and one digitized image, after that both are send to user site separately. Decryption is performed by the overlapping of these two images.  ...  There are several alternatives on JPEG image encryption [8] , but none of them will produce cipher images, the pixel data of which owns a satisfied randomness.  ... 
doi:10.5120/ijca2017913485 fatcat:avxmyx6rufayzm5vb2ecfjhyra

Analysis And Comparison Of Image Encryption Algorithms

İsmet Öztürk, İbrahim Soğukpınar
2007 Zenodo  
Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access.  ...  In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography).  ...  Encryption using Digital Signatures SCAN -Lossless Image Compression and Encryption Using SCAN MIE -Mirror-like Image Encryption CIE -Chaotic Image Encryption VQ -A New Encryption Algorithm for Image  ... 
doi:10.5281/zenodo.1082030 fatcat:bf266f76wrgibj467rwoydcf6a

P3: Toward Privacy-Preserving Photo Sharing [article]

Moo-Ryong Ra, Ramesh Govindan, Antonio Ortega
2013 arXiv   pre-print
With increasing use of mobile devices, photo sharing services are experiencing greater popularity.  ...  Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping).  ...  Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office [42, 41] .  ... 
arXiv:1302.5062v1 fatcat:ryp3m72o6rhflp4wppv4qxum7u

On efficient transparent jpeg2000 encryption

Thomas Stütz, Andreas Uhl
2007 Proceedings of the 9th workshop on Multimedia & security - MM&Sec '07  
Efficient (in the sense of computationally efficient as well as efficient from a distribution technology perspective) formatcompliant transparent encryption schemes for JPEG2000 are investigated.  ...  While the traditional approach of encrypting enhancement layers suffers from high computational encryption demand and drawbacks in distribution, the proposed window encryption approach can reduce computational  ...  This has been proposed by [13, 12] using a scalable video codec based on a spatial resolution pyramid, by [3, 4] using an SNR scalable MPEG-2 encoder/decoder, and by [19] for the progressive JPEG  ... 
doi:10.1145/1288869.1288883 dblp:conf/mmsec/StutzU07 fatcat:jm6ub3qaebe3jh2zn73sppsaoq

A High Capacity Digital Watermarking Scheme for Copyright Protection of Video Data based on YCbCr Color Channels Invariant to Geometric and Non-geometric Attacks

Majid Masoumi, Shervin Amiri
2012 International Journal of Computer Applications  
Eventually, by using a multiplicative hiding method, watermark image is embedded into frequency components of frames. Using this method a large amount of data can be hidden in a video.  ...  nongeometric attacks like Gaussian noise, salt & pepper noise, speckle noise, median & low-pass filtering, blurring, JPEG and MJPEG compression.  ...  (a) (b) (c) (d) (e) Fig.3 (a) Watermark image; (b) Encrypted image(iteration=30); (c) Encrypted image(iteration =75); (d) Encrypted image(iteration =142); (e) Recovered watermark image (iteration =192  ... 
doi:10.5120/8101-1693 fatcat:6afvobknp5evjppfcvjqzpjd6q

A Comparative Study of Recent Steganography Techniques for Multiple Image Formats

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez
2019 International Journal of Computer Network and Information Security  
This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file  ...  encrypted image Steganography.  ...  It supports a number of colors plus a varying degree of transparency. Transparency in the image allows an image to be moved or copied onto any other background image.  ... 
doi:10.5815/ijcnis.2019.01.02 fatcat:d4yzymvaebcx5o7po7l52kzqwy

Secure Patient Data Transfer Using Information Embedding and Hyperchaos

Hanan Aljuaid, Shabir A. Parah
2021 Sensors  
In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR.  ...  The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR.  ...  Figure 6 . 6 Perceptual transparency comparison. Figure 6 .Figure 7 . 67 Perceptual transparency comparison. Perceptual transparency comparison. Figure 7 . 7 Perceptual transparency comparison.  ... 
doi:10.3390/s21010282 pmid:33406623 fatcat:wgxeduwrsvejznygw2gtwe3yhu

Knowledge Management Lifecycle Model in Islamic Banks

Nurdin Nurdin, Khaeruddin Yusuf
2018 Progress in Computing Applications  
In this paper we present a Diffie-Hellman key exchange implementation using stéganographied images.  ...  However, it works only on bitmap images, heavy images and sensitive to compression.  ...  Steganography transparency. (a) The original image. (b) The stéganographied image  ... 
doi:10.6025/pca/2018/7/2/68-78 fatcat:6udzhbqve5djlkppkgttsfsvmi
« Previous Showing results 1 — 15 out of 524 results