A comprehensive survey on secure outsourced computation and its applications

Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo… - IEEE …, 2019 - ieeexplore.ieee.org
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …

Privacy-preserving image classification using vision transformer

Z Qi, AP MaungMaung, Y Kinoshita… - 2022 30th European …, 2022 - ieeexplore.ieee.org
In this paper, we propose a privacy-preserving image classification method that is based on
the combined use of encrypted images and the vision transformer (ViT). The proposed …

A privacy-preserving machine learning scheme using etc images

A Kawamura, Y Kinoshita, T Nakachi… - … on Fundamentals of …, 2020 - search.ieice.org
We propose a privacy-preserving machine learning scheme with encryption-then-
compression (EtC) images, where EtC images are images encrypted by using a block-based …

Privacy-preserving color image feature extraction by quaternion discrete orthogonal moments

X Bi, C Shuai, B Liu, B Xiao, W Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To implement image storage and computation in cloud servers without violating users'
privacy, privacy-preserving feature extraction has been a new research interest. The existing …

An Automatic Privacy‐Aware Framework for Text Data in Online Social Network Based on a Multi‐Deep Learning Model

G Liu, X Sun, Y Li, H Li, S Zhao… - International Journal of …, 2023 - Wiley Online Library
With the increasing severity of user privacy leaks in online social networks (OSNs), existing
privacy protection technologies have difficulty meeting the diverse privacy protection needs …

Entropy-based face recognition and spoof detection for security applications

FA Pujol, MJ Pujol, C Rizo-Maestre, M Pujol - Sustainability, 2019 - mdpi.com
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly
important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is …

Image feature extraction in encrypted domain with privacy-preserving Hahn moments

T Yang, J Ma, Q Wang, Y Miao, X Wang, Q Meng - IEEE Access, 2018 - ieeexplore.ieee.org
With outsourcing huge amount of images to cloud, it can reduce the local storage and
computational overhead of resource-limited users, but the security concerns still impede the …

Accurate image-based pedestrian detection with privacy preservation

H Yang, Q Zhou, J Ni, H Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose an accurate pedestrian detection scheme with privacy
preservation (PPPD) based on pedestrian images. By utilizing the vector homomorphic …

A Privacy-Preserving Evolutionary Computation Framework for Feature Selection

B Sun, JY Li, XF Liu, Q Yang, ZH Zhan… - … Conference on Web …, 2023 - Springer
Feature selection is a crucial process in data science that involves selecting the most
effective subset of features. Evolutionary computation (EC) is one of the most commonly …

HOG feature extraction from encrypted images for privacy-preserving machine learning

M Kitayama, H Kiya - … on Consumer Electronics-Asia (ICCE-Asia …, 2019 - ieeexplore.ieee.org
In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients)
features from encryption-then-compression (EtC) images for privacy-preserving machine …