Visual content privacy protection: A survey

R Zhao, Y Zhang, T Wang, W Wen, Y Xiang… - ACM Computing …, 2023 - dl.acm.org
Vision is the most important sense for people, and it is also one of the main ways of
cognition. As a result, people tend to utilize visual content to capture and share their life …

Biometric-rich gestures: a novel approach to authentication on multi-touch devices

N Sae-Bae, K Ahmed, K Isbister, N Memon - proceedings of the SIGCHI …, 2012 - dl.acm.org
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …

HF-TPE: High-fidelity thumbnail-preserving encryption

Y Zhang, R Zhao, X Xiao, R Lan, Z Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the popularity of cloud storage services, people are increasingly accustomed to storing
images in the cloud. However, cloud storage services raise privacy concerns, eg, leakage of …

F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption

Y Zhang, W Zhou, R Zhao, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People are accustomed to utilizing mobile phones to capture images and uploading them to
the cloud due to various incomparable advantages such as saving the storage space on the …

TPE2: Three-pixel exact thumbnail-preserving image encryption

R Zhao, Y Zhang, X Xiao, X Ye, R Lan - Signal Processing, 2021 - Elsevier
Facing a large number of personal images and local devices with limited resources, the
cloud service plays an increasingly important role in image storage. However, there is no …

[HTML][HTML] High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system

Y Zhang, R Zhao, Y Zhang, R Lan, X Chai - Journal of King Saud University …, 2022 - Elsevier
Privacy concerns may be caused after uploading images into image hosting platforms. For
traditional image encryption, images with rich content and meaning are transformed into …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …

Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation

D An, D Hao, R Zhao, S Zhang, J Lu, Y Zhang - Expert Systems with …, 2023 - Elsevier
Uploading images to the cloud has increasingly become a trend, and users have therefore
enjoyed many benefits brought by the cloud. On the other hand, these images may carry a …

[HTML][HTML] Thumbnail-preserving encryption based on improved logistic system

Z Zhu, L Liu - Journal of King Saud University-Computer and …, 2022 - Elsevier
Plaintext images and images encrypted using traditional encryption schemes in cloud
storage represent the extremes of usability and privacy. Recently, thumbnail-preserving …

EvoPass: Evolvable graphical password against shoulder-surfing attacks

X Yu, Z Wang, Y Li, L Li, WT Zhu, L Song - Computers & Security, 2017 - Elsevier
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …