2018
DOI: 10.1049/iet-spr.2017.0413
|View full text |Cite
|
Sign up to set email alerts
|

JPEG‐based scalable privacy protection and image data utility preservation

Abstract: Here, the authors propose a scalable scrambling algorithm operating in the discrete cosine transform (DCT) domain within the JPEG codec. The goal is to ensure that people are no more identifiable while keeping their actions still understandable regardless of the image size. For each 8 × 8 block, the authors encrypt the DCT coefficients to protect data information, and shift them towards the high frequencies to make the DC position available. Whereas encrypted coefficients appear as noise in the protected image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…In the privacy preserving algorithms for JPEG images based on the DCT scrambling (e.g., [8,22,23]), the protected region will be irregularly deformed with block effects. To improve visual quality of the protected regions as well as achieve smaller file size, the first 6 DCT coefficients of the luminance component (including the DC and AC ones) in zigzag order are modified, which is also enough to protect the content of selected regions according to the experimental results.…”
Section: Modifying Dct Coefficientsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the privacy preserving algorithms for JPEG images based on the DCT scrambling (e.g., [8,22,23]), the protected region will be irregularly deformed with block effects. To improve visual quality of the protected regions as well as achieve smaller file size, the first 6 DCT coefficients of the luminance component (including the DC and AC ones) in zigzag order are modified, which is also enough to protect the content of selected regions according to the experimental results.…”
Section: Modifying Dct Coefficientsmentioning
confidence: 99%
“…According to the work in [3], the block number ranges from 25 to 1600 in a protected region while most are within 25 to 400. Besides, the experiments in [22] show that there are 26 nonzero AC coefficients in a block on average. Given a protected region containing 25 blocks with 26 nonzero coefficients per block, the number of combinations to recover the flipped AC coefficients is 2 25 * 26 = 2 650 , showing that the proposed algorithm is resistant to brute force attack.…”
Section: Security Analysismentioning
confidence: 99%
“…Nevertheless, F5 steganography [19] or another JPEG steganography algorithm (e.g., [20]) is applied in the embedding operation, but the original JPEG images cannot be recovered completely. Similarly, a scalable scrambling algorithm operating in the DCT domain is proposed in [13] within the JPEG codec. The goal is to ensure that people are no more identifiable while keeping their actions still understandable regardless of the image size.…”
Section: Related Workmentioning
confidence: 99%
“…It can be seen that the block number ranged from 25 to 1600, while most of them were concentrated between 25 and 400. Besides, the experiments in [13] show that there are 26 nonzero AC coefficients in a block on average. Suppose that the attacker knows the location of the protected regions and the algorithm adopted for visual transformation.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation