[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

Encryption-then-compression systems using grayscale-based image encryption for JPEG images

T Chuman, W Sirichotedumrong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A block scrambling-based encryption scheme is presented to enhance the security of
Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to …

Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain

W Sirichotedumrong, T Maekawa… - … on Image Processing …, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs for both training and …

Pixel-based image encryption without key management for privacy-preserving deep neural networks

W Sirichotedumrong, Y Kinoshita, H Kiya - Ieee Access, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …

A gan-based image transformation scheme for privacy-preserving deep neural networks

W Sirichotedumrong, H Kiya - 2020 28th European Signal …, 2021 - ieeexplore.ieee.org
We propose a novel image transformation scheme using generative adversarial networks
(GANs) for privacy-preserving deep neural networks (DNNs). The proposed scheme …

Privacy protection based on stream cipher for spatiotemporal data in IoT

T Liu, Y Wang, Y Li, X Tong, L Qi… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is
very important. In this article, cryptography-based methods are utilized to protect participants' …

Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks

H Ito, Y Kinoshita, M Aprilpyone, H Kiya - IEEE Access, 2021 - ieeexplore.ieee.org
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …

Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems

W Sirichotedumrong, H Kiya - APSIPA Transactions on Signal and …, 2019 - cambridge.org
A novel grayscale-based block scrambling image encryption scheme is presented not only
to enhance security, but also to improve the compression performance for Encryption-then …

Image and model transformation with secret key for vision transformer

H Kiya, R Iijima, A Maungmaung… - … on Information and …, 2023 - search.ieice.org
In this paper, we propose a combined use of transformed images and vision transformer
(ViT) models transformed with a secret key. We show for the first time that models trained …

An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase

J Gayathri, S Subashini - Information Sciences, 2019 - Elsevier
In recent years, with the rapid development of chaotic technology, many chaotic image
cryptosystems based on pixel/bit-level techniques have been investigated. However, the …