2020
DOI: 10.1109/tcsvt.2019.2894520
|View full text |Cite
|
Sign up to set email alerts
|

Recompression of JPEG Crypto-Compressed Images Without a Key

Abstract: The rising popularity of social networks and cloud computing has greatly increased number of JPEG compressed image exchanges. In this context, the security of the transmission channel and/or the cloud storage can be susceptible to privacy leaks. Selective encryption is an efficient tool to mask image content and to protect confidentiality while remaining formatcompliant. However, image processing in the encrypted domain is not a trivial task. In this work, we present a JPEG cryptocompression method which allow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 39 publications
0
12
0
Order By: Relevance
“…Compressible encryption methods have been also proposed that consider both security and efficient compression so that they can be adapted to cloud storage and network sharing [8]- [16]. Some of them [11]- [15] can be applied to traditional ML algorithms, such as support vector machine (SVM), k-nearest neighbors (KNN), and random forest, even under the use of the kernel trick [17].…”
Section: Related Work a Visual Information Protectionmentioning
confidence: 99%
“…Compressible encryption methods have been also proposed that consider both security and efficient compression so that they can be adapted to cloud storage and network sharing [8]- [16]. Some of them [11]- [15] can be applied to traditional ML algorithms, such as support vector machine (SVM), k-nearest neighbors (KNN), and random forest, even under the use of the kernel trick [17].…”
Section: Related Work a Visual Information Protectionmentioning
confidence: 99%
“…Compressible encryption methods have been also proposed that consider both security and efficient compression so that they can be adapted to cloud storage and photo sharing services [9]- [14]. Some of them [11]- [13] can be applied to traditional machine learning algorithms, such as support vector machine, k-nearest neighbors, and random forest, even under the use of the kernel trick [15], [16].…”
Section: A Protecting Visual Informationmentioning
confidence: 99%
“…However, cloud providers are not trusted in general, so there is the possibility of data leakage and unauthorized use in cloud environments. Therefore, various privacy-preserving image identification, retrieval, and processing schemes have been studied for untrusted cloud environments [3]- [21].…”
Section: Introductionmentioning
confidence: 99%