[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

An improved DWT-SVD domain watermarking for medical information security

A Anand, AK Singh - Computer Communications, 2020 - Elsevier
Exchange of patient record over network required a technique to guarantee security and
privacy for tele-health services. This paper presents an improved watermarking technique …

Towards integrating image encryption with compression: A survey

KN Singh, AK Singh - ACM Transactions on Multimedia Computing …, 2022 - dl.acm.org
As digital images are consistently generated and transmitted online, the unauthorized
utilization of these images is an increasing concern that has a significant impact on both …

Survey on JPEG compatible joint image compression and encryption algorithms

P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …

Anteater: When arnold's cat meets langton's ant to encrypt images

W Alexan, Y Korayem, M Gabr, M El-Aasser… - IEEE …, 2023 - ieeexplore.ieee.org
With the proliferation of digital images over open networks, secure and efficient encryption
schemes are imperative for safeguarding image privacy. This paper proposes a novel 5 …

F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption

Y Zhang, W Zhou, R Zhao, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People are accustomed to utilizing mobile phones to capture images and uploading them to
the cloud due to various incomparable advantages such as saving the storage space on the …

Pixel-based image encryption without key management for privacy-preserving deep neural networks

W Sirichotedumrong, Y Kinoshita, H Kiya - Ieee Access, 2019 - ieeexplore.ieee.org
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that
enables us not to only apply images without visual information to DNNs but to also consider …

An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption

A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020 - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …

An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios

C Wang, L Song - Information Sciences, 2023 - Elsevier
In this paper, we propose a novel image encryption scheme based on a chaotic system and
compressed sensing for multiple application scenarios. It is a dedicated scheme for JPEG …

A novel hybrid image encryption–compression scheme by combining chaos theory and number theory

I Ahmad, S Shin - Signal Processing: Image Communication, 2021 - Elsevier
Compression and encryption are often performed together for image sharing and/or storage.
The order in which the two operations are carried out affects the overall efficiency of digital …