Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Protection Using Encrypted Images

Dr.B. Raveendranadh Singh, M. Sangeetha, Addula Sandhya

Abstract


Privacy has got considerable attention but is still there is a problem inside multimedia local community. Consider some sort of cloud research scenario the spot that the server can be resource-abundant, and is also capable regarding finishing the particular designated duties. It can be envisioned in which secure advertising applications using privacy preservation is going to be treated seriously. In view that the scale-invariant characteristic transform (SIFT) has become widely adopted in several fields, this project may be the first to the fact that privacy-preserving SORT (PPSIFT) and to address the condition of safeguarded SIFT characteristic extraction and also representation inside encrypted domain.

Keywords


Feature Extraction, Privacy Preservation, Security

Full Text:

PDF

References


W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, “Enabling search over encrypted multimedia databases,” Proc. SPIE, vol. 7254, pp. 1–11, Jan. 2009.

J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar, “Private content based image retrieval,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2008, pp. 1–8.

C. Y. Hsu, C. S. Lu, and S. C. Pei, “Homomorphic encryption-based secure sift for privacy-preserving feature extraction,” Proc. IS&T/SPIE Media Watermark., Forensics, Security, vol. 7880, pp. 788005-1– 788005-17, Jan. 2011.

Z. Yang, S. Kamata, and A. Ahrary, “NIR: Content based image retrieval on cloud computing,” in Proc. IEEE Int. Conf. Intell. Comput. Intell. Syst., vol. 3. Nov. 2009, pp. 556–559.

B. Moskovich and M. Osadchy, “Illumination invariant representation for privacy preserving face identification,” in Proc. IEEE Comput. Vis. Pattern Recognit. Workshop, Jun. 2010, pp. 154–161.

kede ma, weiming zhang, xianfeng zhao, member, ieee, nenghai yu, and fenghua li “reversible data hiding in encrypted images byReserving room before encryption” ieee transactions on information forensics and security, vol. 8, no. 3, march 2013

Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany{ahmad.sadeghi,thomas.schneider}@trust.rub.de??,immo.wehrenberg@rub.de

Tiziano Bianchi, Member, IEEE, Alessandro Piva, Member, IEEE, and Mauro Barni, Senior Member, IEEE

Chao-Yung Hsu,1,2 Chun-Shien Lu,2,∗ and Soo-Chang Pei 11Graduate Institute of Communication Eng., National Taiwan University, Taipei, Taiwan, ROC 2Institute of Information Science, Academia Sinica, Taipei, Taiwan, ROC


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.