2015
DOI: 10.1007/s11042-015-2741-z
|View full text |Cite
|
Sign up to set email alerts
|

AC-coefficient histogram-based retrieval for encrypted JPEG images

Abstract: This paper proposes a novel retrieval scheme for encrypted JPEG images. With this scheme, the DC and AC coefficients of JPEG images are encrypted using a stream cipher and scrambling encryption, respectively. Then, the encrypted images are transmitted to and stored in a server, which can also provide retrieval service. When receiving an encrypted query image, the server without any knowledge of the plaintext content may acquire statistically its AC coefficients histogram. By calculating the distances between t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 20 publications
0
22
0
Order By: Relevance
“…In addition, the JPEG images are encrypted via a partial image encryption [22,25]. Therefore, index tree I is encrypted as T. The leaf node of T is associated with the encrypted images.…”
Section: Sbbt: Secure Balanced Binary Treementioning
confidence: 99%
See 2 more Smart Citations
“…In addition, the JPEG images are encrypted via a partial image encryption [22,25]. Therefore, index tree I is encrypted as T. The leaf node of T is associated with the encrypted images.…”
Section: Sbbt: Secure Balanced Binary Treementioning
confidence: 99%
“…It is designed for the widely used JPEG image. For example, Zhang and Cheng first use DC histogram preserved in the encrypted image as a feature [21] and then exploit AC histogram [22] and a new block feature [23] for retrieval. However, the efficiency of linear comparison or block-wise comparison is unacceptable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For privacy-preserving photo sharing on these services, three requirements need to be satisfied: 1) protection of visual information, 2) tolerance for recompression after encryption, and 3) identification of encrypted images. In terms of requirement 1, a lot of studies on secure and efficient communications have been reported [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. To secure multimedia data, full encryption with provable security, such as RSA and AES, is the most secure option.…”
Section: Introductionmentioning
confidence: 99%
“…To secure multimedia data, full encryption with provable security, such as RSA and AES, is the most secure option. However, most schemes do not consider requirement 2, although requirement 3 is considered in several schemes [13][14][15][16][17]. As systems that satisfy both requirements 1 and 2, Encryption-then-Compression (EtC) systems have been developed [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%