Li et al., 2024 - Google Patents
Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-ChurningLi et al., 2024
View PDF- Document ID
- 18328872052574904388
- Author
- Li M
- Cui Q
- Wang X
- Zhang Y
- Xiang Y
- Publication year
- Publication venue
- Available at SSRN 4698446
External Links
Snippet
With the boom in personal images, cloud services are beginning to take on a significant role in image storage. However, images uploaded to the cloud will face new privacy threats. Image privacy can be effectively protected using traditional encryption methods, but the …
- 238000000034 method 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | HF-TPE: High-fidelity thumbnail-preserving encryption | |
Zhao et al. | TPE2: Three-pixel exact thumbnail-preserving image encryption | |
Sheela et al. | Image encryption based on modified Henon map using hybrid chaotic shift transform | |
Tang et al. | Image encryption with double spiral scans and chaotic maps | |
Ye et al. | An effective framework for chaotic image encryption based on 3D logistic map | |
Li et al. | A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks | |
US9276745B2 (en) | Preserving image privacy when manipulated by cloud services | |
Chang et al. | A new encryption algorithm for image cryptosystems | |
Wright et al. | Thumbnail-preserving encryption for JPEG | |
Zhu et al. | A new image compression-encryption scheme based on compressive sensing and cyclic shift | |
Hanis et al. | Double image compression and encryption scheme using logistic mapped convolution and cellular automata | |
Pan et al. | Novel meaningful image encryption based on block compressive sensing | |
GNDU RC | Dual layer security of data using LSB image steganography method and AES encryption algorithm | |
Lu et al. | Security analysis for privacy preserving search of multimedia | |
Fu-Yan et al. | Image encryption using high-dimension chaotic system | |
Zhang et al. | A Novel 1D Hybrid Chaotic Map‐Based Image Compression and Encryption Using Compressed Sensing and Fibonacci‐Lucas Transform | |
Yang et al. | Dual embedding model: a new framework for visually meaningful image encryption | |
Li et al. | Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning | |
Zhu et al. | Thumbnail-preserving encryption based on improved logistic system | |
Sethi et al. | Chaos-based uncompressed frame level video encryption | |
Zhao et al. | Image Encryption Algorithm Based on a Novel Improper Fractional‐Order Attractor and a Wavelet Function Map | |
Ren et al. | A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment | |
Mehta et al. | DieRoll: A unique key generation and encryption technique | |
Kumar et al. | A novel exponent–sine–cosine chaos map-based multiple-image encryption technique | |
An et al. | A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system |