Sun et al., 2018 - Google Patents
Robust privacy-preserving image sharing over online social networks (OSNs)Sun et al., 2018
View PDF- Document ID
- 14778733736521127332
- Author
- Sun W
- Zhou J
- Zhu S
- Tang Y
- Publication year
- Publication venue
- ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)
External Links
Snippet
Sharing images online has become extremely easy and popular due to the ever-increasing adoption of mobile devices and online social networks (OSNs). The privacy issues arising from image sharing over OSNs have received significant attention in recent years. In this …
- 238000009114 investigational therapy 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
- H04N21/23476—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | Robust privacy-preserving image sharing over online social networks (OSNs) | |
Singh et al. | Towards integrating image encryption with compression: A survey | |
Uhl et al. | Image and video encryption: from digital rights management to secured personal communication | |
Wright et al. | Thumbnail-preserving encryption for JPEG | |
Li et al. | Survey on JPEG compatible joint image compression and encryption algorithms | |
Qin et al. | JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation | |
US9436815B2 (en) | Block management unification system and method | |
Ma et al. | Privacy-preserving TPE-based JPEG image retrieval in cloud-assisted internet of things | |
Sirichotedumrong et al. | Grayscale-based block scrambling image encryption for social networking services | |
Ogiela et al. | False and multi-secret steganography in digital images | |
Parameshachari et al. | A overview on partial image encryption approaches | |
Peng et al. | A selective encryption scheme for protecting H. 264/AVC video in multimedia social network | |
Sun et al. | Processing-aware privacy-preserving photo sharing over online social networks | |
Zhang et al. | Chaos-based partial encryption of SPIHT coded color images | |
Hosny et al. | Fast colored video encryption using block scrambling and multi-key generation | |
Chuman et al. | Image manipulation on social media for encryption-then-compression systems | |
Dolati et al. | A selective encryption for H. 264/AVC videos based on scrambling | |
El-den et al. | Even symmetric chaotic and skewed maps as a technique in video encryption | |
Kumari et al. | A novel Cosine-Cosine chaotic map-based video encryption scheme | |
Hasimoto-Beltran et al. | Secure real-time chaotic partial encryption of entropy-coded multimedia information for mobile devices: Smartphones | |
Singh et al. | An improved encryption–Compression-based algorithm for securing digital images | |
Xu et al. | Dynamic video encryption algorithm for H. 264/AVC based on a spatiotemporal chaos system | |
Chai et al. | TPE-AP: thumbnail-preserving encryption based on adjustable precision for JPEG images | |
Xu et al. | Reversible data hiding in encrypted H. 264/AVC video streams | |
Asghar et al. | MIKEY for keys management of H. 264 scalable video coded layers |