image security
Recently Published Documents


TOTAL DOCUMENTS

249
(FIVE YEARS 98)

H-INDEX

15
(FIVE YEARS 6)

Author(s):  
Ozkan Sengul ◽  
Hasan Ozkilicaslan ◽  
Emrecan Arda ◽  
Uraz Yavanoglu ◽  
Ibrahim Alper Dogru ◽  
...  
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Zhizhe Liu ◽  
Luo Sun

With the popularity of smart devices and the Internet, the volume of multimedia data is growing rapidly, and content-based image retrieval (CBIR) can search for similar images from large-scale images to realize the utilization of the data. For data owners, outsourcing the management and maintenance of image data to cloud service providers can effectively reduce costs, but there is a privacy leakage problem. In this paper, we focus on image feature extraction, index design, and image similarity recognition methods under a dual server model with content-based image security similarity recognition as the research topic, the work done such as proposing a BOVW (Bag of Visual Word) feature-based image security similarity recognition scheme. The scheme combines SIFT (scale-invariant feature transform) feature secure extraction and locally sensitive hashing algorithm to achieve secure extraction of BOVW features of images. To protect the BOVW features of images, an inverted index based on word frequency division is designed, the index is stored in chunks, and an image secure similarity recognition scheme based on CNN (convolutional neural networks) features is proposed. The scalable hash index based on dimensional division is designed based on the image CNN features secure extraction algorithm. The security and performance of the proposed scheme are theoretically analyzed and experimentally verified. Based on different image datasets, the impact of different parameters on the performance of the scheme is tested, and optimized parameters are given. The experimental results show that the proposed scheme in this paper can effectively improve the efficiency of analyzing the similarity of plant botanical art images compared to the existing schemes.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012011
Author(s):  
Xianglian Xue ◽  
Haiyan Jin

Abstract This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based on this, a novel image security protection method based on DCT compression theory and hyper-chaotic mapping is proposed. First, the position of the pixel of the original image is disturbed, and converts the image from spatial domain into frequency domain by the two-dimensional DCT transformation and quantization. Second, change the pixel values by modifying the values of the sign bit of AC coefficient and DC coefficient. At last, the encrypted image is obtained by carrying out inverse quantization, inverse transformation and reverse operation by bit.


2021 ◽  
Author(s):  
Kaijun Wu ◽  
Wanli Dong ◽  
Yunfei Cao ◽  
Xue Wang ◽  
Qi Zhao

2021 ◽  
Author(s):  
Akash Agarwal ◽  
Himanshu Arora ◽  
Monika Mehra ◽  
Debosmit Das

Sign in / Sign up

Export Citation Format

Share Document