Forensics of visual privacy protection in digital images

[1]  Wei Lu,et al.  Binary Image Steganalysis Based on Histogram of Structuring Elements , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Wei Lu,et al.  Secure Binary Image Steganography With Distortion Measurement Based on Prediction , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Qin Zhang,et al.  Downscaling Factor Estimation on Pre-JPEG Compressed Images , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Wei Lu,et al.  Efficient binary image steganalysis based on ensemble neural network of multi-module , 2020, J. Real Time Image Process..

[5]  Wei Lu,et al.  Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism , 2019, Signal Process..

[6]  Jiwu Huang,et al.  Secure Halftone Image Steganography Based on Pixel Density Transition , 2019, IEEE Transactions on Dependable and Secure Computing.

[7]  Wei Lu,et al.  Secure Binary Image Steganography Based on Fused Distortion Measurement , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Wei Lu,et al.  Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment , 2019, Int. J. Digit. Crime Forensics.

[9]  Wei Sun,et al.  Region duplication detection based on hybrid feature and evaluative clustering , 2019, Multimedia Tools and Applications.

[10]  Wei Lu,et al.  Image Deblocking Detection Based on a Convolutional Neural Network , 2019, IEEE Access.

[11]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Fei Xue,et al.  Defocus blur detection based on multiscale SVD fusion in gradient domain , 2019, J. Vis. Commun. Image Represent..

[13]  Wei Lu,et al.  Binary image steganography based on joint distortion measurement , 2019, J. Vis. Commun. Image Represent..

[14]  Wei Lu,et al.  Copy-move detection of digital audio based on multi-feature decision , 2018, J. Inf. Secur. Appl..

[15]  Wei Lu,et al.  Copy-move forgery detection using combined features and transitive matching , 2018, Multimedia Tools and Applications.

[16]  Wei Lu,et al.  Efficient halftone image steganography based on dispersion degree optimization , 2018, Journal of Real-Time Image Processing.

[17]  Zhenyu Wu,et al.  Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.

[18]  Wei Lu,et al.  Scaling factor estimation on JPEG compressed images by cyclostationarity analysis , 2018, Multimedia tools and applications.

[19]  Wei Lu,et al.  Double JPEG compression detection based on block statistics , 2018, Multimedia Tools and Applications.

[20]  Ruxin Wang,et al.  Digital image splicing detection based on Markov features in block DWT domain , 2018, Multimedia Tools and Applications.

[21]  J. Lai,et al.  Region duplication detection based on image segmentation and keypoint contexts , 2018, Multimedia Tools and Applications.

[22]  Wei Lu,et al.  Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix , 2018 .

[23]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[24]  Yicong Zhou,et al.  Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion , 2018, Signal Process. Image Commun..

[25]  Wei Lu,et al.  Natural image deblurring based on L0-regularization and kernel shape optimization , 2018, Multimedia Tools and Applications.

[26]  Huan Wang,et al.  New cubic reference table based image steganography , 2018, Multimedia Tools and Applications.

[27]  Klaus Schöffmann,et al.  Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.

[28]  Yong Jae Lee,et al.  Learning to Anonymize Faces for Privacy Preserving Action Detection , 2018, ECCV.

[29]  Wei Tsang Ooi,et al.  Sprite tree: an efficient image-based representation for networked virtual environments , 2017, The Visual Computer.

[30]  Zheng Qin,et al.  Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..

[31]  Fan Yang,et al.  Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching , 2017, Multimedia Tools and Applications.

[32]  Xin Liao,et al.  Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.

[33]  Bin Li,et al.  MSE period based estimation of first quantization step in double compressed JPEG images , 2017, Signal Process. Image Commun..

[34]  Wei Lu,et al.  Fast Copy-Move Detection of Digital Audio , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).

[35]  Fan Yang,et al.  Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..

[36]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[37]  Hamid Hassanpour,et al.  Automatic estimation and segmentation of partial blur in natural images , 2017, The Visual Computer.

[38]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[39]  Weiming Zhang,et al.  Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.

[40]  Jie Li,et al.  Blind image motion deblurring with L0-regularized priors , 2016, J. Vis. Commun. Image Represent..

[41]  Wei Lu,et al.  Joint image splicing detection in DCT and Contourlet transform domain , 2016, J. Vis. Commun. Image Represent..

[42]  Qian Wang,et al.  Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.

[43]  Michael S. Ryoo,et al.  Privacy-Preserving Human Activity Recognition from Extreme Low Resolution , 2016, AAAI.

[44]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[45]  Yicong Zhou,et al.  Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..

[46]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[47]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[48]  Sung Wook Baik,et al.  A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption , 2015, KSII Trans. Internet Inf. Syst..

[49]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[50]  Cong Wang,et al.  Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.

[51]  Yunhao Liu,et al.  Enable Portrait Privacy Protection in Photo Capturing and Sharing , 2014, ArXiv.

[52]  Jing Dong,et al.  Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.

[53]  Weiming Zhang,et al.  Non-local Denoising in Encrypted Images , 2014, IOV.

[54]  Yicong Zhou,et al.  Image encryption using binary bitplane , 2014, Signal Process..

[55]  Li Xu,et al.  Discriminative Blur Detection Features , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[56]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.

[57]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[58]  Yao Zhao,et al.  Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[59]  Weiming Zhang,et al.  A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Trans. Inf. Forensics Secur..

[60]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[61]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[62]  Stefan Katzenbeisser,et al.  Privacy-preserving architecture for forensic image recognition , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[63]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[64]  Alexandros André Chaaraoui,et al.  An Efficient Approach for Multi-view Human Action Recognition Based on Bag-of-Key-Poses , 2012, HBU.

[65]  Alexandros André Chaaraoui,et al.  A review on vision techniques applied to Human Behaviour Analysis for Ambient-Assisted Living , 2012, Expert Syst. Appl..

[66]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[67]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[68]  King Ngi Ngan,et al.  A Co-Saliency Model of Image Pairs , 2011, IEEE Transactions on Image Processing.

[69]  Shijian Lu,et al.  Blurred image region detection and classification , 2011, ACM Multimedia.

[70]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[71]  Vincenzo Piuri,et al.  Privacy-preserving fingercode authentication , 2010, MM&Sec '10.

[72]  Kah Phooi Seng,et al.  Privacy preserving stereoscopic vision with One-Bit transform , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[73]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[74]  Seungyong Lee,et al.  Fast motion deblurring , 2009, ACM Trans. Graph..

[75]  Marco Zennaro,et al.  Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[76]  K. J. Ray Liu,et al.  Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.

[77]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[78]  David A. Forsyth,et al.  Generalizing motion edits with Gaussian processes , 2009, ACM Trans. Graph..

[79]  Yao Zhao,et al.  Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.

[80]  Sen-Ching S. Cheung,et al.  Managing privacy data in pervasive camera networks , 2008, 2008 15th IEEE International Conference on Image Processing.

[81]  Patricia Ladret,et al.  The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.

[82]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[83]  Yong Rui,et al.  Light Weight Background Blurring for Video Conferencing Applications , 2006, 2006 International Conference on Image Processing.

[84]  Shai Avidan,et al.  Blind Vision , 2006, ECCV.

[85]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[86]  Norihiro Hagita,et al.  Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[87]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[88]  Carman Neustaedter,et al.  The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.

[89]  Nariman Farvardin,et al.  A perceptually motivated three-component image model-Part I: description of the model , 1995, IEEE Trans. Image Process..

[90]  Yicong Zhou,et al.  Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling , 2019, IEEE Transactions on Multimedia.

[91]  Shengshan Hu,et al.  Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. , 2016, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[92]  Yôiti Suzuki,et al.  [Foreword] Welcome to the Special Section on Future Audiovisual Media: UHDTV, 3DTV, and Beyond , 2014 .

[93]  Noboru Babaguchi,et al.  Recoverable Privacy Protection for Video Content Distribution , 2009, EURASIP J. Inf. Secur..