This paper proposes a novel scalable compression method for stream cipher encrypted images, where stream cipher is used in the standard format. The bit stream in the base layer is produced by coding a series of nonove...
详细信息
This paper proposes a novel scalable compression method for stream cipher encrypted images, where stream cipher is used in the standard format. The bit stream in the base layer is produced by coding a series of nonoverlapping patches of the uniformly down-sampled version of the encrypted image. An off-line learning approach can be exploited to model the reconstruction error from pixel samples of the original image patch, based on the intrinsic relationship between the local complexity and the length of the compressed bit stream. This error model leads to a greedy strategy of adaptively selecting pixels to be coded in the enhancement layer. At the decoder side, an iterative, multiscale technique is developed to reconstruct the image from all the available pixel samples. Experimental results demonstrate that the proposed scheme outperforms the state-of-the-arts in terms of both rate-distortion performance and visual quality of the reconstructed images at low and medium rate regions.
To accomplish robust watermark extraction in reversible watermarking both in plaintext domain and encrypteddomain, a separable robust reversible watermarking in encrypted 2D vector graphics is proposed in this paper....
详细信息
To accomplish robust watermark extraction in reversible watermarking both in plaintext domain and encrypteddomain, a separable robust reversible watermarking in encrypted 2D vector graphics is proposed in this paper. Firstly, a content owner uses a key to scramble the polar angles of the vertices to encrypt the graphics in the polar coordinate system. Consequently, a watermark embedder maps the encoded watermark segments to different vertices under the control of an embedding key and an HMAC (hash-based message authentication code) function. After that, the polar angle of the vertex is slightly adjusted to embed a watermark. Since the decryption operation does not affect the embedded watermark, the watermark can be extracted both in the plaintext and encrypteddomain. Experimental results and analysis show that the proposed scheme can achieve good invisibility and reversibility. It can effectively resist normal operations such as rotation, scaling, translation (RST) and entity reordering, and it has good robustness against malicious attacks such as vertices/entities addition, deletion and modification.
Discrete sine transform (DST) is widely used in compression encoding, image processing, and speech enhancement. In cloud computing, outsourcing plaintext data to the cloud has the risk of private data leakage. In this...
详细信息
ISBN:
(纸本)9783031067884;9783031067877
Discrete sine transform (DST) is widely used in compression encoding, image processing, and speech enhancement. In cloud computing, outsourcing plaintext data to the cloud has the risk of private data leakage. In this paper, we study how to realize data computation outsourcing with privacy protection. We propose a scheme to implement DST in the encrypteddomain that uses the scaling method to represent decimals. To improve the accuracy, we also propose a new scheme to implement high precision encrypteddomain DST. We approximate complex numbers with high precision using integer coefficient polynomials whose independent variable is a unit root. With this representation, we can perform DST in the encryption domain with high precision. We conducted experiments to verify the effectiveness and efficiency. The two schemes have the advantages of high speed and high precision, respectively.
signal processing in encrypted domain has attracted high attention during the needs of content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) also becomes a hot topic. However, mo...
详细信息
ISBN:
(纸本)9783319534640;9783319534657
signal processing in encrypted domain has attracted high attention during the needs of content security and privacy protection. Reversible data hiding in encrypted images (RDH-EI) also becomes a hot topic. However, most of the published techniques are designed for uncompressed images rather than JPEG-, VQ- and BTC-compressed images. In this paper, for the first time, a RDH-EI method for AMBTC images is proposed. In this method, the higher mean and lower mean of a triple in AMBTC compressed image is encrypted by using stream cipher with the same random bits. Therefore, the spatial correlation of a nature image is preserved and redundant space can be exploited by using the histogram of prediction error. Experimental results demonstrate that the proposed method can embed considerable bits while leave little distortion.
When encrypted data need to be sent to an untrusted computer for processing, it is highly desirable to have a homomorphic cryptosystem that allows the untrusted computer to process the encryptedsignals totally withou...
详细信息
ISBN:
(纸本)9781612843490
When encrypted data need to be sent to an untrusted computer for processing, it is highly desirable to have a homomorphic cryptosystem that allows the untrusted computer to process the encryptedsignals totally without decryption such that, when the encrypteddomain result is decrypted, the decrypted value is the same as the equivalent plaintext domain operation. These operations range from basic arithmetic operations to complicated transformations. In this paper, we analyze the existence of equivalent operations in the encrypteddomain for four of the common bitwise operations: OR, AND, NOR and NAND in plaintext domain. We will show that such equivalent operations should not exist. For otherwise, if such operations exist, the RSA cryptosystems can be broken by a low-complexity attack.
signal processing in encrypted domain has become an important mean to protect privacy in an untrusted network environment. Due to the limitations of the underlying encryption methods, many useful algorithms that are s...
详细信息
ISBN:
(纸本)9781728127767
signal processing in encrypted domain has become an important mean to protect privacy in an untrusted network environment. Due to the limitations of the underlying encryption methods, many useful algorithms that are sophisticated are not well implemented. Considering that QR decomposition is widely used in many fields, in this paper, we propose to implement QR decomposition in homomorphic encrypteddomain. We firstly realize some necessary primitive operations in homomorphic encrypteddomain, including division and open square operation. Gram-Schmidt process is then studied in the encrypteddomain. We propose the implementation of QR decomposition in the encrypteddomain by using the secure implementation of Gram-Schmidt process. We conduct experiments to demonstrate the effectiveness and analyze the performance of the proposed outsourced QR decomposition.
signalprocessing in the encrypteddomain (SPED) has received considerable attention as it aims at privacy-preserving solutions for various applications. Discrete cosine transform (DCT) is a popular signal transform w...
详细信息
ISBN:
(纸本)9781665416580
signalprocessing in the encrypteddomain (SPED) has received considerable attention as it aims at privacy-preserving solutions for various applications. Discrete cosine transform (DCT) is a popular signal transform widely used in signalprocessing. It has many applications in speech processing, still picture coding, image and video transformation, compression coding, and so on. In this paper, we mainly study how to implement DCT in the encryption domain with high precision. We propose a new scheme to implement encrypteddomain DCT. This scheme encodes a complex number as a unit root polynomial in the evaluation, and realizes the high precision representation of complex numbers. With this representation, this scheme can also realize the high precision representation of decimals. To improve the computational efficiency, we also propose a fast implementation of DCT in the encryption domain, which can significantly improve the DCT speed for large-scale matrices. We conducted experiments to verify the effectiveness and efficiency. When the matrix size is small, our original method has the advantages of both high accuracy and fast speed. When the matrix size is large, the fast implementation outperforms the original method.
暂无评论