用于隐私保护的轻量级选择性图像加密

Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang
{"title":"用于隐私保护的轻量级选择性图像加密","authors":"Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang","doi":"10.11989/JEST.1674-862X.80327011","DOIUrl":null,"url":null,"abstract":"To protect personal privacy and confidential preservation, access control is used to authorize legal users for safe browsing the authorized contents on photos. The access control generates an authorization rule according to each permission assignment. However, the general access control is inappropriate to apply in some social services (e.g., photos posted on Flickr and Instagram, personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed. With low maintenance loads, this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation. The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.","PeriodicalId":53467,"journal":{"name":"Journal of Electronic Science and Technology","volume":"18 1","pages":"234-240"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Light-Weight Selective Image Encryption for Privacy Preservation\",\"authors\":\"Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang\",\"doi\":\"10.11989/JEST.1674-862X.80327011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To protect personal privacy and confidential preservation, access control is used to authorize legal users for safe browsing the authorized contents on photos. The access control generates an authorization rule according to each permission assignment. However, the general access control is inappropriate to apply in some social services (e.g., photos posted on Flickr and Instagram, personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed. With low maintenance loads, this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation. The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.\",\"PeriodicalId\":53467,\"journal\":{\"name\":\"Journal of Electronic Science and Technology\",\"volume\":\"18 1\",\"pages\":\"234-240\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Electronic Science and Technology\",\"FirstCategoryId\":\"95\",\"ListUrlMain\":\"https://doi.org/10.11989/JEST.1674-862X.80327011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electronic Science and Technology","FirstCategoryId":"95","ListUrlMain":"https://doi.org/10.11989/JEST.1674-862X.80327011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

为了保护个人隐私和保密,通过访问控制对合法用户进行授权,使其能够安全地浏览照片上授权的内容。访问控制根据每次权限分配生成授权规则。但是,由于存储和管理数字图像的日益普及,一般的访问控制不适用于某些社会服务(例如,在Flickr和Instagram上发布的照片,手机中的个人图像管理)。在低维护负荷的情况下,结合数据隐藏技术,提出了一种保护隐私的访问控制机制。该方案将给定图像的部分区域改变为随机填充(称为选择性图像加密),并且只允许授权人员将随机填充恢复为具有与原始图像相似视觉质量的有意义的填充。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Light-Weight Selective Image Encryption for Privacy Preservation
To protect personal privacy and confidential preservation, access control is used to authorize legal users for safe browsing the authorized contents on photos. The access control generates an authorization rule according to each permission assignment. However, the general access control is inappropriate to apply in some social services (e.g., photos posted on Flickr and Instagram, personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed. With low maintenance loads, this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation. The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Electronic Science and Technology
Journal of Electronic Science and Technology Engineering-Electrical and Electronic Engineering
CiteScore
4.30
自引率
0.00%
发文量
1362
审稿时长
99 days
期刊介绍: JEST (International) covers the state-of-the-art achievements in electronic science and technology, including the most highlight areas: ¨ Communication Technology ¨ Computer Science and Information Technology ¨ Information and Network Security ¨ Bioelectronics and Biomedicine ¨ Neural Networks and Intelligent Systems ¨ Electronic Systems and Array Processing ¨ Optoelectronic and Photonic Technologies ¨ Electronic Materials and Devices ¨ Sensing and Measurement ¨ Signal Processing and Image Processing JEST (International) is dedicated to building an open, high-level academic journal supported by researchers, professionals, and academicians. The Journal has been fully indexed by Ei INSPEC and has published, with great honor, the contributions from more than 20 countries and regions in the world.
期刊最新文献
Source localization based on field signatures: Laboratory ultrasonic validation Machine learning model based on non-convex penalized huberized-SVM Iterative physical optics method based on efficient occlusion judgment with bounding volume hierarchy technology A multi-scale persistent spatiotemporal transformer for long-term urban traffic flow prediction Big data challenge for monitoring quality in higher education institutions using business intelligence dashboards
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1