[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2024 - Google Patents

Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning

Li et al., 2024

View PDF
Document ID
18328872052574904388
Author
Li M
Cui Q
Wang X
Zhang Y
Xiang Y
Publication year
Publication venue
Available at SSRN 4698446

External Links

Snippet

With the boom in personal images, cloud services are beginning to take on a significant role in image storage. However, images uploaded to the cloud will face new privacy threats. Image privacy can be effectively protected using traditional encryption methods, but the …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Zhang et al. HF-TPE: High-fidelity thumbnail-preserving encryption
Zhao et al. TPE2: Three-pixel exact thumbnail-preserving image encryption
Sheela et al. Image encryption based on modified Henon map using hybrid chaotic shift transform
Tang et al. Image encryption with double spiral scans and chaotic maps
Ye et al. An effective framework for chaotic image encryption based on 3D logistic map
Li et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
US9276745B2 (en) Preserving image privacy when manipulated by cloud services
Chang et al. A new encryption algorithm for image cryptosystems
Wright et al. Thumbnail-preserving encryption for JPEG
Zhu et al. A new image compression-encryption scheme based on compressive sensing and cyclic shift
Hanis et al. Double image compression and encryption scheme using logistic mapped convolution and cellular automata
Pan et al. Novel meaningful image encryption based on block compressive sensing
GNDU RC Dual layer security of data using LSB image steganography method and AES encryption algorithm
Lu et al. Security analysis for privacy preserving search of multimedia
Fu-Yan et al. Image encryption using high-dimension chaotic system
Zhang et al. A Novel 1D Hybrid Chaotic Map‐Based Image Compression and Encryption Using Compressed Sensing and Fibonacci‐Lucas Transform
Yang et al. Dual embedding model: a new framework for visually meaningful image encryption
Li et al. Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning
Zhu et al. Thumbnail-preserving encryption based on improved logistic system
Sethi et al. Chaos-based uncompressed frame level video encryption
Zhao et al. Image Encryption Algorithm Based on a Novel Improper Fractional‐Order Attractor and a Wavelet Function Map
Ren et al. A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment
Mehta et al. DieRoll: A unique key generation and encryption technique
Kumar et al. A novel exponent–sine–cosine chaos map-based multiple-image encryption technique
An et al. A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system