用户名: 密码: 验证码:
A game theory-based block image compression method in encryption domain
详细信息    查看全文
  • 作者:Shaohui Liu ; Anand Paul ; Guochao Zhang ; Gwanggil Jeon
  • 关键词:Image compression in encrypted domain ; Image encryption ; Privacy protection ; Game theory ; Network content security
  • 刊名:The Journal of Supercomputing
  • 出版年:2015
  • 出版时间:September 2015
  • 年:2015
  • 卷:71
  • 期:9
  • 页码:3353-3372
  • 全文大小:2,159 KB
  • 参考文献:1. http://鈥媤eixin.鈥媞q.鈥媍om/鈥?/span>
    2. http://鈥媟ecode.鈥媙et/鈥?014/鈥?5/鈥?8/鈥媗ook-at-this-were-uploading-and-sharing-a-staggering-1-8-billion-photos-a-day/鈥?/span>
    3.Molina B (2014) Personal Apple: iCloud not breached in celebrity photo leak. Sep. 2014. online available: http://鈥媤ww.鈥媢satoday.鈥媍om/鈥媠tory/鈥媡ech/鈥媝ersonal/鈥?014/鈥?9/鈥?2/鈥媋pple-icloud-leak/鈥?4979323/鈥?/span>
    4.Nie XS, Liu J, Sun JD, Wang LQ, Yang XH (2013) Robust video hashing based on representative-dispersive frames. Sci China Inform Sci 56(6):1鈥?1MathSciNet CrossRef
    5.Squicciarini AC, Lin D, Sundareswaran S, Wede J (2014) Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans Knowl Data Eng. doi:10.鈥?109/鈥婽KDE.鈥?014.鈥?320729
    6.Mitchell J (2010) Making photo tagging easier. Online Available: http://鈥媌log.鈥媐acebook.鈥媍om/鈥媌log.鈥媝hp?鈥媝ost=鈥?67145887130
    7.Gao W, Tian YH, Huang TJ, Yang Q (2010) Vlogging: a survey of videoblogging technology on the web. ACM Comput Surv 42(4): Article No.15
    8.Zhu, H, Dusit N, Walid S, Tamer B (2012) Game theory in wireless and communication networks-theory, models and applications. Cambridge Uinversity Press, Cambridge
    9.Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu QS (2010) A survey of game theory as applied to network security. In: Proceedings of the 43rd Hawaii international conference on system sciences, Honolulu, HI, pp 1鈥?0
    10.Mohammad H, Zhu QY, Tansu A, Tamer B, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3): Article 24
    11.Lye KW, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4:71鈥?6CrossRef
    12.Cheng H, Li XB (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439鈥?451CrossRef
    13.Signal Guest editors: Piva A, Katzenbeisser S (2007) Processing in the encrypted domain. EURASIP J Inform Secur 2007
    14.Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52(10): 2992鈥?006
    15.Zhang GC, Liu SH, Jiang F, Zhao DB, Gao W (2013) An improved image compression scheme with an adaptive parameters set in encrypted domain. VCIP 2013:1鈥?
    16.Hassinen M, Mussalo P (2005) Client controlled security for web applications. In: The 30th anniversary on local computer networks, IEEE Computer Society, pp 810鈥?16
    17.Poller A, Steinebach M, Liu H (2012) Robust image obfuscation for privacy protection in Web 2.0 applications. IS&T SPIE Electronic Imaging. In: International society for optics and photonics, SPIE, 830304-830304-15
    18.Zhou Y, Panetta K, Agaian S (2009) Image encryption using discrete parametric cosine transform. In: Proceedings of the 43rd asilomar conference on signals, systems and computers, ser. Asilomar鈥?9. Piscataway, NJ, USA. IEEE Press, pp 395鈥?99
    19.Podesser M, Schmidt HP, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. In: The 5th nordic signal processing symposium, pp 10鈥?7
    20.Yekkala A, Madhavan CEV (2007) Bit plane encoding and encryption. In: Proceedings of the 2nd international conference on pattern recognition and machine intelligence, ser. PReMI鈥?7. Springer, Berlin, pp 103鈥?10
    21.Xiong ZX, Liveris AD, Cheng S (2004) Distributed source coding for sensor networks. IEEE Signal Process Mag 21(5):80鈥?4CrossRef
    22.Schonberg D, Draper SC, Ramchandran K (2005) On blind compression of encrypted correlated data approaching the source entropy rate. In: Proceedings of the 43rd Annual Allerton Conference, Allerton, IL
    23.Schonberg D, Draper SC, Yeo CH, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inform Forensics Secur 3(4):749鈥?62CrossRef
    24.Lazzeretti R, Barni M (2008) Lossless compression of encrypted greylevel and color images. In: Proceedings of the 16th EUSIPCO, Lausanne, Switzerland
    25.Kumar AA, Makur A (2009) Lossy compression of encrypted image by compressive sensing technique. TENCON 2009鈥?009 IEEE Region 10 Conference, pp 1鈥?
    26.Liu W, Zeng W, Dong L, Yao Q (2010) Efficient compression of encrypted grayscale images. IEEE Trans Image Process 19(4):1097鈥?102MathSciNet CrossRef
    27.Kang XG, Xu XY, Peng AJ, Zeng WJ (2012) Scalable lossy compression for pixel-value encrypted images. In: IEEE data compression conference 2012, Snowbird, Utah, USA April 10鈥?2
    28.Kang XG, Peng AJ, Xu XY, Cao XC (2013) Performing scalable lossy compression on pixel encrypted images. EURASIP J Image Video Process 32:1鈥?
    29.Zhang XP (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inform Forensics Secur 6(1):53鈥?8CrossRef
    30.Zhang J, Xiong RQ, Ma SW, Zhao DB (2011) High-quality image restoration from partial random samples in spatial domain. In: IEEE visual communications and image processing (VCIP), pp 1鈥?
    31.Ahmad I, Luo JC (2006) On using game theory to optimize the rate control in video coding. IEEE Trans CSVT 16(2):209鈥?19
    32. http://鈥媠ipi.鈥媢sc.鈥媏du/鈥媎atabase/鈥?/span>
    33.Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600鈥?12CrossRef
    34.Lagendijk RL, Erkin Z, Barni M (2013) Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process Mag 30(1):82鈥?05CrossRef
    35.Yao Q, Zeng W, Liu W (2009) Multi-resolution based hybrid spatiotemporal compression of encrypted videos. In: Proceedings of the IEEE international conference on acoustics speech and signal processing, Taipei, Taiwan, ROC, 725鈥?28
  • 作者单位:Shaohui Liu (1)
    Anand Paul (2)
    Guochao Zhang (1)
    Gwanggil Jeon (3)

    1. School of Computer Science and Technology, Harbin Institute of Technology, Harbin, 150001, China
    2. School of Computer Science and Engineering, Kyungpook National University, Taegu, South Korea
    3. Department of Embedded Systems Engineering, College of Information and Technology, Incheon National University, Incheon, South Korea
  • 刊物类别:Computer Science
  • 刊物主题:Programming Languages, Compilers and Interpreters
    Processor Architectures
    Computer Science, general
  • 出版者:Springer Netherlands
  • ISSN:1573-0484
文摘
With the development of digital imaging technology and the prevalence of mobile devices with camera, internet privacy has been a growing concern for public. Especially in some private chat groups in social network, for example, Facebook, WeChat, and MySpace, some people want to share their personal images by internet service provider without leaking this information while the internet service provider can also take some additional measures on these images, for example, reducing the network bandwidth. How to provide technologies or software with such functionalities, usually conflicting goals, becomes increasingly urgent in both academia and industry. Image encryption is a choice; however, it does not provide the additional function needed by internet service providers. Recently, game theory is widely used in network security to solve such problem with conflicting goals. In fact, there is a game theory between users and service providers. This paper proposes a block-based image compression method in encrypted domain which provides not only the privacy protection capability but also the additional operation capability needed by internet service providers. This block-based method can be formulated as a game theoretical problem and can be optimized by game theory. First, the image to be shared will be encrypted in block-by-block way by owner with simple encryption operation. Second, the service providers can send the part or full of the encrypted image stream according to the available bandwidth with an adaptive parameter sets. Finally, the intended receivers can decrypt the received encrypted stream to recover the image. Extensive experiments show that the proposed algorithm improves the compression performance compared with the-state-of algorithms. Keywords Image compression in encrypted domain Image encryption Privacy protection Game theory Network content security

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700