• Title/Summary/Keyword: Image Privacy

Search Result 100, Processing Time 0.022 seconds

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy

  • Shiu, Chih-Wei;Chen, Yu-Chi;Hong, Wien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1020-1042
    • /
    • 2019
  • Reversible data hiding in encrypted images (RDHEI) provides some real-time cloud applications; i.e. the cloud, acting as a data-hider, automatically embeds timestamp in the encrypted image uploaded by a content owner. Many existing methods of RDHEI only satisfy user privacy in which the data-hider does not know the original image, but leaks owner privacy in which the receiver can obtains the original image by decryption and extraction. In the literature, the method of Zhang et al. is the one providing weak content-owner privacy in which the content-owner and data-hider have to share a data-hiding key. In this paper, we take care of the stronger notion, called strong content-owner privacy, and achieve it by presenting a new reversible data hiding in encrypted images. In the proposed method, image decryption and message extraction are separately controlled by different types of keys, and thus such functionalities are decoupled to solve the privacy problem. At the technique level, the original image is segmented along a Hilbert filling curve. To keep image privacy, segments are transformed into an encrypted image by using random permutation. The encrypted image does not reveal significant information about the original one. Data embedment can be realized by using pixel histogram-style hiding, since this property, can be preserved before or after encryption. The proposed method is a modular method to compile some specific reversible data hiding to those in encrypted image with content owner privacy. Finally, our experimental results show that the image quality is 50.85dB when the averaged payload is 0.12bpp.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

The role of corporate image and privacy concerns in adopting online travel services

  • Tapanainen, Tommi;Nguyen, Thi Thanh Hai;Dao, Kien Trung
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.1-23
    • /
    • 2019
  • Purpose This study examines the role of corporate image and privacy concerns in intention to use of online travel services using data from Vietnam. Design/methodology/approach The data collection was implemented to a student sample at the Foreign Trade University in Hanoi, which has a high concentration of young people who are interested in online travel in Vietnam. The paper based questionnaire was directly delivered to the respondents. After sorting to eliminate unfit samples, the number of responses was 541, which exceeds 500, the minimum number typically required. To test the hypotheses, we applied structural equation modeling (SEM) and Confirmatory Factor Analysis (CFA) was used to evaluate the reliability and validity of constructs in the model. We also used direct, indirect and total effect coefficient to evaluate the total impact of factors on the intention to use online services. Findings This study found that corporate image is positively associated to intention to use online services. It found a link between corporate image and privacy concerns, which suggests another way for firms to address their customers' privacy concerns; corporate image, which has received great attention in traditional offline sales channels, but not in online services, should receive higher attention in IS research. Online travel businesses, besides increasing ease of use, perceived usefulness and trust in their services, should focus on build a reliable corporate image, which can not only promote the service use but also help to eliminate users' the privacy concerns.

Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox (소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

Measurement of Visual Privacy in the Royal Palaces focusing on the Prospect and Refuge - A case of Gyeongbokgung and Changdeokgung - (전망과 은신처의 개념을 도입한 궁궐건축의 시각적 프라이버시 정량화에 관한 연구 - 경복궁과 창덕궁을 중심으로 -)

  • Hwang, Ji-Hyoun;Lee, Hyunsoo
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.3
    • /
    • pp.3-10
    • /
    • 2016
  • The unexpected expansion of the built environment has allowed for high-density and high-rise buildings. As high-density dwellings compromise privacy, the requirements for balancing between interacting with others and protecting privacy are increasing. In this respect, Korean traditional architecture provides privacy through a proper balance of openness and closure in the courtyard garden. However, it is difficult to analyze privacy quantitatively, as it depends on the individual experience and psychology. The analyzing for visual privacy is a significant issue to resolve a conflict with others and enhance human's comfort. Therefore, this paper addresses the assumption that visual privacy could ultimately be quantified based on the concept of prospect and refuge, one of the design strategies for psychological wellbeing. The purpose of this study is to examine visual privacy in the royal palace in Korea, Gyeongbokgung and Changdeokgung. It measures spatial configuration in each buildings using space syntax, and the area ratio of prospect and refuge through an image analysis with Adobe Photoshop CS6. The mathematical properties of connectivity, depth, control value, integration and the area ratio of prospect and refuge are partially available for quantifying visual privacy in buildings.

Implementation of Real-Time Image Blurring System for User Privacy Support (사용자 보호를 위한 실시간 이미지 모자이크 처리 시스템 개발)

  • Minyeong Kim;Suah Jeon;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.39-42
    • /
    • 2023
  • Recently, with the explosive increase of video streaming services, real-time live broadcasting has also increased, which leads to an infringement problem for user privacy. So, to solve such problems, we proposed the real image blurring system using dlib face-recognition library. 68 face landmarks are extracted and convert into 128 vector values. After that the proposed system tries to compare this value with the image in the database, and if it is over 0.45, it is considered as different person and image blurring processing is performed. With the proposed system, it is possible to solve the problem of user privacy infringement, and also to be utilized to detect the specific person. Through experimental results, the proposed system has an accuracy of more than 90% in terms of face recognition.

  • PDF

Privacy Protection from Unmanned Aerial Vehicle (무인항공기 사생활 보호 방안)

  • Lee, Bosung;Lee, Joongyeup;Park, Yujin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1057-1071
    • /
    • 2016
  • Privacy-right infringement using unmanned aerial vehicle (UAV) usually occurs due to the unregistered small UAV with the image data processing equipment. In this paper we propose that privacy protection acts, Personal Information Protection Act, Information and Communications Network Act, are complemented to consider the mobility of image data processing equipment installed on UAV. Furthermore, we suggest the regulations for classification of small UAVs causing the biggest concern of privacy-right infringement are included in aviation legislations. In addition, technological countermeasures such as recognition of UAV photographing and masking of identifying information photographed by UAV are proposed.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

CCTV Monitoring System Development for Safety Management and Privacy in Manufacturing Site

  • Han, Ji Hee;Ok, Sang Hun;Song, Kyu;Jang, Dong Young
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.26 no.3
    • /
    • pp.272-277
    • /
    • 2017
  • CCTV image processing techniques have been developed for safety management in manufacturing sites. However, CCTV growth has become a social problem for video surveillance with regard to privacy. This study aims to manage the safety system efficiently and protect privacy simultaneously. In this study, the CCTV monitoring system is composed of five steps (accident monitoring, detection, notification, management, restoration). De-identified image is observed when we are in a normal situation. De-identified image changes to identified image when it detects an accident. As soon as it detects an accident, the accident information is sent to the safety administrator. Then the administrator could conduct safety measures. Afterward, accumulated accident data could be used for statistical data that could be utilized as analyzing expecting accident.

Design of Searchable Image Encryption System of Streaming Media based on Cloud Computing (클라우드 컴퓨팅 기반 스트리밍 미디어의 검색 가능 이미지 암호 시스템의 설계)

  • Cha, Byung-Rae;Kim, Dae-Kyu;Kim, Nam-Ho;Choi, Se-Ill;Kim, Jong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.811-819
    • /
    • 2012
  • In this paper, we design searchable image encryption system to provide the privacy and authentication on streaming media based on cloud computing. The searchable encryption system is the matrix of searchable image encryption system by extending the streaming search from text search, the search of the streaming service is available, and supports personal privacy and authentication using encryption/decryption and CBIR technique. In simple simulation of post-cut and image keyword creation, we can verify the possibilities of the searchable image encryption system based on streaming service.