Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives
暂无分享,去创建一个
[1] Ijaz Ahmad,et al. Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis , 2023, 2023 International Conference on Information Networking (ICOIN).
[2] Ijaz Ahmad,et al. Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications , 2022, 2022 13th International Conference on Information and Communication Technology Convergence (ICTC).
[3] Ijaz Ahmad,et al. IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning , 2022, Sensors.
[4] H. Kiya,et al. A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images , 2022, Applied Sciences.
[5] Ijaz Ahmad,et al. A Perceptual Encryption-Based Image Communication System for Deep Learning-Based Tuberculosis Diagnosis Using Healthcare Cloud Services , 2022, Electronics.
[6] Suk-seung Hwang,et al. Privacy-Preserving Surveillance for Smart Cities , 2022, 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN).
[7] Takeshi Koshiba,et al. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap , 2022, Applied System Innovation.
[8] H. Kiya,et al. Privacy-Preserving Image Classification Using an Isotropic Network , 2022, IEEE MultiMedia.
[9] H. Kiya,et al. A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images , 2022, 2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech).
[10] H. Kiya,et al. An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications , 2022, APSIPA Transactions on Signal and Information Processing.
[11] Ijaz Ahmad,et al. Encryption-then-Compression System for Cloud-based Medical Image Services , 2022, 2022 International Conference on Information Networking (ICOIN).
[12] Hitoshi Kiya,et al. A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency , 2021, J. Imaging.
[13] A. Alfalou,et al. Privacy-Preserving Deep Neural Network Methods: Computational and Perceptual Methods—An Overview , 2021 .
[14] Hitoshi Kiya,et al. Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images , 2021, 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech).
[15] Hitoshi Kiya,et al. A Content-based Image Retrieval Scheme Using Compressible Encrypted Images , 2021, 2020 28th European Signal Processing Conference (EUSIPCO).
[16] Ruifeng Li,et al. A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System , 2021, IEICE Trans. Inf. Syst..
[17] Seokjoo Shin,et al. A novel hybrid image encryption-compression scheme by combining chaos theory and number theory , 2021, Signal Process. Image Commun..
[18] H. Kiya,et al. Flexible Data Hiding and Extraction in EtC Images , 2020, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[19] H. Kiya,et al. A Reversible Data Hiding Method in Compressible Encrypted Images , 2020, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[20] Ijaz Ahmad,et al. Region-based Selective Compression and Selective Encryption of Medical Images , 2020, SMA.
[21] Kwok-Tung Lo,et al. Survey on JPEG compatible joint image compression and encryption algorithms , 2020, IET Signal Process..
[22] Hitoshi Kiya,et al. A Privacy-Preserving Machine Learning Scheme Using EtC Images , 2020, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[23] Somaia SerElkhetm,et al. A Survey study on Joint Image Compression - Encryption Methods , 2020, 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE).
[24] Hitoshi Kiya,et al. Privacy-preserving machine learning using EtC images , 2019, Other Conferences.
[25] H. Kiya,et al. Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services , 2019, IEICE Trans. Inf. Syst..
[26] Hitoshi Kiya,et al. Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images , 2020, IEEE Access.
[27] Hitoshi Kiya,et al. Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services , 2019, 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[28] Pratistha Mathur,et al. Paradigms of Image Compression and Encryption: A Review , 2019, 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT).
[29] Hitoshi Kiya,et al. An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services , 2019, 2019 IEEE International Conference on Image Processing (ICIP).
[30] Chengqing Li,et al. When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..
[31] Hitoshi Kiya,et al. Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems , 2019, APSIPA Transactions on Signal and Information Processing.
[32] Hitoshi Kiya,et al. Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.
[33] Hitoshi Kiya,et al. Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems , 2018, IEICE Trans. Inf. Syst..
[34] Hitoshi Kiya,et al. A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components , 2018, IEICE Trans. Inf. Syst..
[35] Hang Zhou,et al. Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.
[36] Hitoshi Kiya,et al. Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems , 2018, 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE).
[37] Hitoshi Kiya,et al. Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[38] Kwok-Tung Lo,et al. A Content-Adaptive Joint Image Compression and Encryption Scheme , 2018, IEEE Transactions on Multimedia.
[39] Bruno Carpentieri,et al. Efficient Compression and Encryption for Digital Data Transmission , 2018, Secur. Commun. Networks.
[40] Yong Zhang,et al. Test and Verification of AES Used for Image Encryption , 2018 .
[41] Hitoshi Kiya,et al. Image manipulation on social media for encryption-then-compression systems , 2017, 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[42] Masaaki Fujiyoshi,et al. Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System , 2017, ICAIP.
[43] Hitoshi Kiya,et al. Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling , 2017, SCIA.
[44] Hitoshi Kiya,et al. An Encryption-then-Compression System for Lossless Image Compression Standards , 2017, IEICE Trans. Inf. Syst..
[45] Hitoshi Kiya,et al. An encryption-then-compression system for JPEG XR standard , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).
[46] Kun He,et al. Robust and Secure Image Encryption Schemes During JPEG Compression Process , 2016, IMAWM.
[47] Hitoshi Kiya,et al. An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[48] Hitoshi Kiya,et al. A perceptual encryption scheme for Motion JPEG 2000 standard , 2015, 2015 15th International Symposium on Communications and Information Technologies (ISCIT).
[49] Hitoshi Kiya,et al. An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).
[50] Sen Bai,et al. A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding , 2015, Commun. Nonlinear Sci. Numer. Simul..
[51] Hitoshi Kiya,et al. An Encryption-then-Compression system for JPEG 2000 standard , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[52] Kiyoshi Tanaka,et al. Beyond format-compliant encryption for JPEG image , 2015, Signal Process. Image Commun..
[53] Stefan Jaeger,et al. Two public chest X-ray datasets for computer-aided screening of pulmonary diseases. , 2014, Quantitative imaging in medicine and surgery.
[54] Vijay Varadharajan,et al. Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .
[55] Xiaolong Li,et al. A new lossy compression scheme for encrypted gray-scale images , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[56] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[57] Zhenxing Qian,et al. Compressing Encrypted Images With Auxiliary Information , 2014, IEEE Transactions on Multimedia.
[58] Yuan Yan Tang,et al. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.
[59] Nicola Asuni,et al. TESTIMAGES: a Large-scale Archive for Testing Visual Devices and Basic Image Processing Algorithms , 2014, STAG.
[60] Xiaochun Cao,et al. Performing scalable lossy compression on pixel encrypted images , 2013, EURASIP J. Image Video Process..
[61] Andrew C. Gallagher. Jigsaw puzzles with pieces of unknown orientation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[62] Xinpeng Zhang,et al. Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..
[63] Shuyuan Zhu,et al. Perceptual video encryption using multiple 8×8 transforms in H.264 and MPEG-4 , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[64] Xinpeng Zhang,et al. Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.
[65] William T. Freeman,et al. A probabilistic image jigsaw puzzle solver , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[66] Wenjun Zeng,et al. Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.
[67] Anamitra Makur,et al. Distributed source coding based encryption and lossless compression of gray scale and color images , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[68] Mauro Barni,et al. Lossless compression of encrypted grey-level and color images , 2008, 2008 16th European Signal Processing Conference.
[69] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[70] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[71] William Puech,et al. Crypto-compression of medical images by selective encryption of DCT , 2005, 2005 13th European Signal Processing Conference.
[72] Kannan Ramchandran,et al. On blind compression of encrypted data approaching the source entropy rate , 2005, 2005 13th European Signal Processing Conference.
[73] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[74] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[75] G. Bjontegaard,et al. Calculation of Average PSNR Differences between RD-curves , 2001 .
[76] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[77] N. Ahmed,et al. Discrete Cosine Transform , 1996 .