Sorry, you need to enable JavaScript to visit this website.

Multimedia security and content protection

AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES

Paper Details

Authors:
Kenta Iida, Hitoshi Kiya
Submitted On:
29 September 2019 - 5:53am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICIP2019poster_KIida_final.pdf

(4)

Subscribe

[1] Kenta Iida, Hitoshi Kiya, "AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4811. Accessed: Oct. 15, 2019.
@article{4811-19,
url = {http://sigport.org/4811},
author = {Kenta Iida; Hitoshi Kiya },
publisher = {IEEE SigPort},
title = {AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES},
year = {2019} }
TY - EJOUR
T1 - AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES
AU - Kenta Iida; Hitoshi Kiya
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4811
ER -
Kenta Iida, Hitoshi Kiya. (2019). AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES. IEEE SigPort. http://sigport.org/4811
Kenta Iida, Hitoshi Kiya, 2019. AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES. Available at: http://sigport.org/4811.
Kenta Iida, Hitoshi Kiya. (2019). "AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES." Web.
1. Kenta Iida, Hitoshi Kiya. AN IMAGE IDENTIFICATION SCHEME OF ENCRYPTED JPEG IMAGES FOR PRIVACY PRESERVING PHOTO SHARING SERVICES [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4811

Image Analysis and Processing in the Encrypted Domain


In this research project, we are interested by finding solutions to the problem of image analysis and processing in the encrypted domain. For security reasons, more and more digital data are transferred or stored in the encrypted domain. However, during the transmission or the archiving of encrypted images, it is often necessary to analyze or process them, without knowing the original content or the secret key used during the encryption phase. We propose to work on this problem, by associating theoretical aspects with numerous applications.

Paper Details

Authors:
Submitted On:
20 September 2019 - 12:16pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

20190912_Poster_3MT_ICIP2019_PPuteaux.pdf

(9)

Subscribe

[1] , "Image Analysis and Processing in the Encrypted Domain", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4792. Accessed: Oct. 15, 2019.
@article{4792-19,
url = {http://sigport.org/4792},
author = { },
publisher = {IEEE SigPort},
title = {Image Analysis and Processing in the Encrypted Domain},
year = {2019} }
TY - EJOUR
T1 - Image Analysis and Processing in the Encrypted Domain
AU -
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4792
ER -
. (2019). Image Analysis and Processing in the Encrypted Domain. IEEE SigPort. http://sigport.org/4792
, 2019. Image Analysis and Processing in the Encrypted Domain. Available at: http://sigport.org/4792.
. (2019). "Image Analysis and Processing in the Encrypted Domain." Web.
1. . Image Analysis and Processing in the Encrypted Domain [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4792

Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme


Social network development raises many issues relating to privacy protection for images. In particular, multi-party privacy protection conflicts can take place when an image is published by only one of its owners. Indeed, privacy settings applied to this image are those of its owner and people on the image are not involved in the process. In this paper, we propose a new hierarchical secret image sharing scheme for social networks in order to answer this problem.

Paper Details

Authors:
Submitted On:
20 September 2019 - 11:46am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

20190920_ICIP2019_SBeugnon_PPuteaux_WPuech.pdf

(9)

Subscribe

[1] , "Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4790. Accessed: Oct. 15, 2019.
@article{4790-19,
url = {http://sigport.org/4790},
author = { },
publisher = {IEEE SigPort},
title = {Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme},
year = {2019} }
TY - EJOUR
T1 - Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme
AU -
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4790
ER -
. (2019). Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme. IEEE SigPort. http://sigport.org/4790
, 2019. Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme. Available at: http://sigport.org/4790.
. (2019). "Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme." Web.
1. . Privacy Protection for Social Media based on a Hierarchical Secret Image Sharing Scheme [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4790