A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Transparent Image Encryption Using Progressive JPEG
[chapter]
2006
Lecture Notes in Computer Science
This paper investigates how transparent encryption can be realized through selective encryption of the progressive JPEG modes. ...
Many application scenarios do not demand confidential encryption of visual data, but on the contrary require that certain image information is public (transparent encryption). ...
Conclusions Progressive and hierarchical JPEG may be used for transparent encryption in an efficient manner due to the scalable data format. ...
doi:10.1007/11836810_21
fatcat:j6yaprgbkvhsnnuj7px4o4owim
Efficient visual secret sharing scheme for color images
2006
Pattern Recognition
However, most imaging applications including digital photography, archiving and internet communications nowadays use images in the JPEG compressed format. ...
In this paper we propose a shared key algorithm that works directly in the JPEG domain, thus enabling shared key image encryption for a variety of applications. ...
For the progressive-DCT JPEG encoding, the proposed encryption scheme applies directly. Once the shares are created, the progressive-DCT based scans could be applied to generate two JPEG shares. ...
doi:10.1016/j.patcog.2005.06.010
fatcat:ukj3pc5yg5hltir4ebtayo7id4
A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images
2014
EURASIP Journal on Information Security
JPEG XR is the most recent still image coding standard, and custom security features for this format are required for fast adoption of the standard. ...
This paper proposes, discusses, and evaluates a set of format-compliant encryption methods for the JPEG XR standard: coefficient scan order permutation, sign bit encryption, transform-based encryption, ...
This allows for a low-quality preview image during transmission similar to progressive JPEG. ...
doi:10.1186/1687-417x-2014-6
fatcat:m4piivmwczenllnwle5ikt7ima
Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms
2019
Symmetry
The experimental results show that the watermarking image encrypted by this method not only has good transparency, but also has strong anti-brightness/contrast attack, anti-shearing, and anti-noise performance ...
image in the time domain to achieve the effect of encryption. ...
Therefore, JPEG images are widely used in web design. At present, lossless compression coding is the dominant coding scheme for symmetrically encrypted digital watermarking image. ...
doi:10.3390/sym11121505
fatcat:u5irqdiatzduxhcwqbqd2pkhay
Designing Secure and Survivable Stegosystems
English
2006
Defence Science Journal
English
Secure Schemes for JPEG Images JPEG is today one of the most popular coding formats for still images. ...
A large number of schemes based on manipulation of the JPEG coefficients were used for hiding data in images 9 . ...
doi:10.14429/dsj.56.1886
fatcat:ltbcoqfo7bexljjlihc2udy6ge
A new blockchain-based trusted DRM scheme for built-in content protection
2018
EURASIP Journal on Image and Video Processing
In the transparence of watermark, HVS and Watson models are used to control the watermark strength, which can enhance the invisibility. ...
In the scheme, we use image Arnold transform to enhance the security and use image DCT coefficients of middle frequency to embed watermark for robustness. ...
We scramble the binary image using Arnold transform for security and then convert the encrypted image into one-dimensional image sequence and then use logistic mapping to encrypt the one-dimensional sequence ...
doi:10.1186/s13640-018-0327-1
fatcat:rn5ndqxfnjhvnlbesm4m5umg2a
Transparent hashing in the encrypted domain for privacy preserving image retrieval
2013
Signal, Image and Video Processing
To facilitate this, the encryption process must remain transparent to specific image statistics computed in the spatial or transform domain. ...
Search through a database of encrypted images against a crumpled and encrypted query will remain privacy preserving only if comparisons between selective features derived from these images is executed ...
Most of the architectures developed for privacy preserving search and retrieval engines for images use encrypted feature sets or specific feature transparent multimedia encryption schemes. 2 Related literature ...
doi:10.1007/s11760-013-0471-0
fatcat:5gvr6jryarha5f74mtwvvjvcym
Framework for Visual Cryptographic based Encryption and Decryption
2017
International Journal of Computer Applications
In this paper, main focus is on the development of an encryption-decryption framework using some object oriented language and its development. ...
Target image is converted into black & white image and one digitized image, after that both are send to user site separately. Decryption is performed by the overlapping of these two images. ...
There are several alternatives on JPEG image encryption [8] , but none of them will produce cipher images, the pixel data of which owns a satisfied randomness. ...
doi:10.5120/ijca2017913485
fatcat:avxmyx6rufayzm5vb2ecfjhyra
Analysis And Comparison Of Image Encryption Algorithms
2007
Zenodo
Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. ...
In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). ...
Encryption using Digital Signatures
SCAN -Lossless Image Compression and Encryption Using SCAN
MIE -Mirror-like Image Encryption
CIE -Chaotic Image Encryption
VQ -A New Encryption Algorithm for Image ...
doi:10.5281/zenodo.1082030
fatcat:bf266f76wrgibj467rwoydcf6a
P3: Toward Privacy-Preserving Photo Sharing
[article]
2013
arXiv
pre-print
With increasing use of mobile devices, photo sharing services are experiencing greater popularity. ...
Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). ...
Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office [42, 41] . ...
arXiv:1302.5062v1
fatcat:ryp3m72o6rhflp4wppv4qxum7u
On efficient transparent jpeg2000 encryption
2007
Proceedings of the 9th workshop on Multimedia & security - MM&Sec '07
Efficient (in the sense of computationally efficient as well as efficient from a distribution technology perspective) formatcompliant transparent encryption schemes for JPEG2000 are investigated. ...
While the traditional approach of encrypting enhancement layers suffers from high computational encryption demand and drawbacks in distribution, the proposed window encryption approach can reduce computational ...
This has been proposed by [13, 12] using a scalable video codec based on a spatial resolution pyramid, by [3, 4] using an SNR scalable MPEG-2 encoder/decoder, and by [19] for the progressive JPEG ...
doi:10.1145/1288869.1288883
dblp:conf/mmsec/StutzU07
fatcat:jm6ub3qaebe3jh2zn73sppsaoq
A High Capacity Digital Watermarking Scheme for Copyright Protection of Video Data based on YCbCr Color Channels Invariant to Geometric and Non-geometric Attacks
2012
International Journal of Computer Applications
Eventually, by using a multiplicative hiding method, watermark image is embedded into frequency components of frames. Using this method a large amount of data can be hidden in a video. ...
nongeometric attacks like Gaussian noise, salt & pepper noise, speckle noise, median & low-pass filtering, blurring, JPEG and MJPEG compression. ...
(a) (b) (c) (d) (e)
Fig.3 (a) Watermark image; (b) Encrypted image(iteration=30); (c) Encrypted image(iteration =75); (d) Encrypted image(iteration =142); (e) Recovered watermark image (iteration =192 ...
doi:10.5120/8101-1693
fatcat:6afvobknp5evjppfcvjqzpjd6q
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
2019
International Journal of Computer Network and Information Security
This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file ...
encrypted image Steganography. ...
It supports a number of colors plus a varying degree of transparency. Transparency in the image allows an image to be moved or copied onto any other background image. ...
doi:10.5815/ijcnis.2019.01.02
fatcat:d4yzymvaebcx5o7po7l52kzqwy
Secure Patient Data Transfer Using Information Embedding and Hyperchaos
2021
Sensors
In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR. ...
The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR. ...
Figure 6 . 6 Perceptual transparency comparison.
Figure 6 .Figure 7 . 67 Perceptual transparency comparison. Perceptual transparency comparison.
Figure 7 . 7 Perceptual transparency comparison. ...
doi:10.3390/s21010282
pmid:33406623
fatcat:wgxeduwrsvejznygw2gtwe3yhu
Knowledge Management Lifecycle Model in Islamic Banks
2018
Progress in Computing Applications
In this paper we present a Diffie-Hellman key exchange implementation using stéganographied images. ...
However, it works only on bitmap images, heavy images and sensitive to compression. ...
Steganography transparency. (a) The original image. (b) The stéganographied image ...
doi:10.6025/pca/2018/7/2/68-78
fatcat:6udzhbqve5djlkppkgttsfsvmi
« Previous
Showing results 1 — 15 out of 524 results