4.8 Article

Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption

Yushu Zhang et al.

Summary: This study proposes a new encryption scheme that achieves a balance between privacy protection and usability by improving the connectivity issue of Markov chains in existing schemes. The proposed scheme effectively encrypts images and protects privacy, while also being more efficient than existing methods.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Engineering, Electrical & Electronic

HF-TPE: High-Fidelity Thumbnail- Preserving Encryption

Yushu Zhang et al.

Summary: With the popularity of cloud storage services, the privacy and user experience issues of storing sensitive images in the cloud have gained attention. Researchers propose a new high-fidelity thumbnail-preserving encryption scheme (HF-TPE) to address the shortcomings of existing schemes.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Information Systems

High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system

Yongming Zhang et al.

Summary: This article proposes a scheme that combines thumbnail-preserving encryption (TPE) with chaotic systems, significantly reducing the encryption and decryption time while achieving a balance between privacy and visual usability.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Privacy and Confidentiality in Process Mining: Threats and Research Challenges

Gamal Elkoumy et al.

Summary: This article highlights the significance of privacy and confidentiality in process mining and proposes challenges that need to be addressed in future research on privacy-preserving and confidential process mining techniques.

ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS (2022)

Article Computer Science, Information Systems

Primitively visually meaningful image encryption: A new paradigm

Ruoyu Zhao et al.

Summary: Traditional image encryption methods transform images into meaningless noise-like ones, while the proposed visually meaningful image encryption (VMIE) method preserves the visual meaning of the encrypted image. To further improve this method, a new paradigm called primitively visually meaningful image encryption is introduced, along with a permutation-diffusion architecture that retains the original visual meaning of the encrypted image. The prototype of this method has been experimentally proven to be superior.

INFORMATION SCIENCES (2022)

Article Engineering, Electrical & Electronic

TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key

Xiuli Chai et al.

Summary: In this study, a more efficient thumbnail preserving encryption (TPE) algorithm is proposed using CycleGan to simulate randomized unary encoding (RUE). The algorithm ensures the visual quality of encrypted images through thumbnail consistency loss and improves the quality of decrypted images via ssim-loss. Additionally, a decryption network with a key is retrained to decrypt cipher images in multiple domains, and a binary string is used as the key for facilitating image sharing.

IEEE SIGNAL PROCESSING LETTERS (2022)

Article Telecommunications

IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT

Zhaoquan Gu et al.

Summary: With the development of IoT, data privacy and security threats have become emerging challenges in green IoT image transmission. To address the limited computing power of devices, a parallel chaotic system named PSBP is proposed, along with a cost-efficient image encryption algorithm IEPSBP based on PSBP.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2022)

Article Computer Science, Information Systems

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things

Yi Ding et al.

Summary: The paper proposes a deep-learning-based image encryption and decryption network (DeepEDN) to protect the privacy and security of patients by using a cycle-generative adversarial network (Cycle-GAN) to encrypt and restore medical images. The proposed method achieves good performance in efficiency and security.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Green & Sustainable Science & Technology

A review of Africa's transition from fossil fuels to renewable energy using circular economy principles

G. Mutezo et al.

Summary: The concept of circular economy has gained traction worldwide in the past decade, with more organizations considering its application in daily operations. The energy transition in Africa presents challenges and opportunities, particularly in the shift from fossil fuels to renewable energy sources.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2021)

Article Engineering, Mechanical

Color image encryption using orthogonal Latin squares and a new 2D chaotic system

Zhongyun Hua et al.

Summary: In this study, a new color image encryption algorithm is proposed by introducing a two-dimensional chaotic system and orthogonal Latin squares, which fully considers the inherent connections between color images and Latin squares, achieving encryption at the pixel level.

NONLINEAR DYNAMICS (2021)

Article Engineering, Electrical & Electronic

TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption

Ruoyu Zhao et al.

Summary: This paper discusses the balance between privacy protection and usability of images in the cloud, introduces a new image encryption scheme TPE2 that achieves exact TPE in a group of three pixels, and shows that the encrypted images by the scheme have good image quality and a satisfactory balance of usability and privacy.

SIGNAL PROCESSING (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Personalized and Invertible Face De-identification by Disentangled Identity Information Manipulation

Jingyi Cao et al.

Summary: This paper introduces a personalized and reversible de-identification method based on deep generative models, which uses user-specific password and adjustable parameters to control identity variation. Extensive experiments show the effectiveness and generalization of this framework for face de-identification and recovery.

2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

PECAM: Privacy-Enhanced Video Streaming and Analytics via Securely-Reversible Transformation

Hao Wu et al.

Summary: As Video Streaming and Analytics (VSA) systems gain popularity, concerns regarding privacy have also increased. The proposed VSA privacy enhancement system (PECAM) utilizes Generative Adversarial Networks for privacy-enhanced video transformation, while optimizing system workflow to reduce network bandwidth usage and enable real-time camera processing. Experimental results show that PECAM effectively enhances visual privacy with high accuracy, outperforming baseline methods in terms of computing cost and network bandwidth usage.

PROCEEDINGS OF THE 27TH ACM ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (ACM MOBICOM '21) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

InfoScrub: Towards Attribute Privacy by Targeted Obfuscation

Hui-Po Wang et al.

Summary: The study investigates the privacy risks associated with sharing personal photos online and proposes a novel image obfuscation framework to protect private information by maximizing uncertainty while maintaining image fidelity. The approach utilizes a discriminator for bi-directional translation and predicts an image interpolation to increase uncertainty, resulting in obfuscated images faithful to the originals with significantly higher uncertainty.

2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2021 (2021)

Article Computer Science, Information Systems

PSNR vs SSIM: imperceptibility quality assessment for image steganography

De Rosal Igantius Moses Setiadi

Summary: PSNR and SSIM are widely used measuring tools in image quality assessment, with PSNR used earlier and SSIM designed based on human visual system factors. Research findings show that LSB performs best based on PSNR, while PVD performs best based on SSIM. The study concludes that SSIM is a better measure of imperceptibility in all aspects and should be preferred in future steganographic research.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Toward Green IoT: Energy Solutions and Key Challenges

Xilong Liu et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Artificial Intelligence

Image Inpainting Using Nonlocal Texture Matching and Nonlinear Filtering

Ding Ding et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)

Article Computer Science, Theory & Methods

Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images

Tatsuya Chuman et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations

Mohsin Shah et al.

ACM Transactions on Multimedia Computing Communications and Applications (2019)

Review Computer Science, Information Systems

Privacy in Internet of Things: From Principles to Technologies

Chao Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Automation & Control Systems

Data Anonymization for Data Protection on Publicly Recorded Data

David Muench et al.

COMPUTER VISION SYSTEMS (ICVS 2019) (2019)

Article Automation & Control Systems

Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption

Khan Muhammad et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

A Reliable and Reversible Image Privacy Protection Based on False Colors

Serdar Ciftci et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Multidisciplinary Sciences

Marine heatwaves under global warming

Thomas L. Frolicher et al.

NATURE (2018)

Proceedings Paper Computer Science, Information Systems

Image Pixelization with Differential Privacy

Liyue Fan

DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018 (2018)

Article Telecommunications

Accounting for the Varying Supply of Solar Energy When Designing Wireless Access Networks

Margot Deruyck et al.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos

Eman T. Hassan et al.

2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2017)

Article Computer Science, Theory & Methods

On the Security of Permutation-Only Image Encryption Schemes

Alireza Jolfaei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Security and Privacy Protection in Visual Sensor Networks: A Survey

Thomas Winkler et al.

ACM COMPUTING SURVEYS (2014)

Article Computer Science, Information Systems

W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video

Mukesh Saini et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Information Systems

Internet of Things for Smart Cities

Andrea Zanella et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)