skip to main content
10.1145/3133264.3133281acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicaipConference Proceedingsconference-collections
research-article

Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System

Published: 25 August 2017 Publication History

Abstract

This paper proposes an encryption-then-compression (ETC)-based copyright- and privacy-protected image trading system. It focuses on image copyright protection, consumer's privacy protection, and compression-friendliness with accepting any fingerprinting techniques. In the system, the ETC is applied to images for visual protection of consumer's privacy, whereas the conventional purpose of ETC techniques does not assume that a trusted third party decompresses an image for digital fingerprinting. With the same system features, the proposed system gives better performances in terms of visual protection, image quality, compression compatibility, and fingerprinting than those of conventional systems.

References

[1]
Schneier, B. 1996. "Applied cryptography: protocols, algorithms, and source code in C," 2nd ed., John Wiley & Sons.
[2]
Okada, M., Okabe, Y., and Uehara, T. "A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking," Proc. IEEE CCNC, 2010.
[3]
Okada, M., Okabe, Y., and Uehara, T. "Semi-blind fingerprinting utilizing ordinary existing watermarking techniques," Digital Watermarking, Lecture Notes in Computer Science, IWDW, vol. 5703, Springer, Berlin, Heidelberg, 2009.
[4]
Kuribayashi, M. "Recent fingerprinting techniques with cryptographic protocol," Signal Processing, Sebastian Miron (Ed.), InTech, 2010, Available from: https://www.intechopen.com/books/signal-processing/recent-fingerprinting-techniqueswith-cryptographic-protocol.
[5]
Sengoku, Y. andHioki, H. "A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking," Proc. ITC-CSCC, D-W1-02, Sapporo, Japan, 15-18 Jul. 2012.
[6]
Liu, S., Sae-Tang, W., Fujiyoshi, M., and Kiya, H. "An efficient compression of amplitude-only images for the image trading system," IEICE Trans. Fundamentals, vol. E97-D, no. 2, Feb. 2014.
[7]
Sae-Tang, W., Fujiyoshi, M., and Kiya, H. "A generation method of amplitude-only images with low intensity ranges," IEICE Trans. Fundamentals, vol. E96-A, no. 6, pp. 1323--1330, Jun. 2013.
[8]
Sae-Tang, W., LIU, S., Fujiyoshi, M., and Kiya, H. "1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems," ECTI-CIT, vol. 8, no. 2, Nov. 2014.
[9]
Zhou, J., Liu, X., Au, O. C., and Tang, Y. Y. "Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation," IEEE Trans. Inf. Forens. Security, vol. 9, no. 1, pp. 39--50, Jan. 2014.
[10]
Kurihara, K., Shiota, S., and Kiya, H. "An encryption-then-compression system for JPEG standard," Proc. Picture Coding Symposium, pp. 119--123, Cairns, Australia, 2nd Jun. 2015.
[11]
Tachibana, T., Fujiyoshi, M., and Kiya, H. "An image-quality guaranteed watermarking scheme with spreading spectrum of watermark," Proc. IEEE International Symposium on Communications and Information Technologies, vol. 1, no. 27PM2C-5, pp. 330--334, Sapporo, Japan, 27th Oct. 2004.

Cited By

View all

Index Terms

  1. Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICAIP '17: Proceedings of the International Conference on Advances in Image Processing
    August 2017
    223 pages
    ISBN:9781450352956
    DOI:10.1145/3133264
    © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    In-Cooperation

    • Sultan Qaboos University: Sultan Qaboos University
    • USM: Universiti Sains Malaysia

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 August 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG
    2. Visual encryption
    3. block-based operations
    4. spatial domain

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICAIP 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media