期刊文献+

加密域图像处理综述 被引量:3

Image Processing in Encrypted Domain:a Comprehensive Survey
下载PDF
导出
摘要 随着人们越来越关心隐私安全问题,关于加密域信号处理的研究得到了广泛关注,而往往包含大量个人隐私的图像也有必要以隐私保护的方式进行处理.回顾了近年来加密域图像处理中的各种领域,包括基本的图像处理技术,如加密域的线性变换、线性滤波和特征提取,以及进一步的图像处理应用,如安全图像隐写、安全图像检索和加密图像压缩,并且总结了这些方向的研究趋势和前景. With the ever increasing concern of privacy security,signal processing in encrypted domain has drawn considerable attentions.Since an image often contain much personal and privacy information,it is also necessary to process images in a privacy protection manner.This article reviewed the recent advances in secure image processing in a variety of fields,including fundamental image processing techniques like linear transforms,linear filtering and feature extraction in encrypted domain and further image processing applications like secure image data hiding,secure image retrieval and encrypted image compression.The future research trends and prospects in these directions were also presented in this article.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2016年第2期174-183,共10页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(61372149) 北京市自然科学基金资助项目(4142009)
关键词 加密域 图像处理 隐私保护 encrypted domain image processing privacy preserving
  • 相关文献

参考文献62

  • 1HU N, CHEUNG S S, NGUYEN T. Secure image filtering[C] //Image Processing, 2006 IEEE InternationalConference on. Piscataway, N J: IEEE, 2006: 1553-1556.
  • 2ERKIN Z, PIVA A, KATZENBEISSER S, et al.Protection and retrieval of encrypted multimedia content:when cryptography meets signal processing [J/ OL].EURASIP Journal on Information Security, 2007, 2007(17): 1-20[2015-01-11]. http: //dx. doi. org/10. 1155/2007/78943.
  • 3LAGENDIJK R L, ERKIN Z, BARNI M. Encrypted signalprocessing for privacy protection: conveying the utility ofhomomorphic encryption and multiparty computation[J].Signal Processing Magazine, 2013, 30(1): 82-105.
  • 4PUECH W, ERKIN Z, BARNI M, et al. Emergingcryptographic challenges in image and video processing[C]//Image Processing (ICIP), 2012 19th IEEE InternationalConference on. Piscataway, NJ: IEEE, 2012: 2629-2632.
  • 5BIANCHI T, PIVA A. Secure watermarking for multimediacontent protection: a review of its benefits and open issues[J]. Signal Processing Magazine, 2013, 30(2): 87-96.
  • 6PAILLIER P. Public-key cryptosystems based oncomposite degree residuosity classes [C] //Advances inCryptology-EUROCRYPT蒺99. Berlin: Springer, 1999:223-238.
  • 7TRONCOSO-PASTORIZA J R, P魪REZ-GONZ魣LEZ F.Secure adaptive filtering [J]. Information Forensics andSecurity, IEEE Transactions on, 2011, 6(2): 469-485.
  • 8ERKIN Z, FRANZ M, GUAJARDO J, et al. Privacy-preserving face recognition[C/ OL] //Privacy EnhancingTechnologies. Berlin: Springer, 2009: 235-253[2015-02-07]. http: //dx. doi. org/10. 1007/978-3-642-03168-7_14.
  • 9UPMANYU M, NAMBOODIRI A M, SRINATHAN K, etal. Blind authentication: a secure crypto-biometricverification protocol [J]. Information Forensics andSecurity, IEEE Transactions on, 2010, 5(2): 255-268.
  • 10BELLARE M, HOANG V T, ROGAWAY P.Foundations of garbled circuits[C/ OL]//Proceedings ofthe 2012 ACM Conference on Computer andCommunications Security. New York, NY: ACM, 2012:784-796[2015-02-08]. http: //doi. acm. org/10. 1145/2382196. 2382279.

同被引文献20

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部