Please use this identifier to cite or link to this item:
http://hdl.handle.net/11452/32622
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Memon, Nasir | - |
dc.contributor.author | Dziech, A. | - |
dc.contributor.author | Czyzewski, A. | - |
dc.date.accessioned | 2023-05-11T11:27:38Z | - |
dc.date.available | 2023-05-11T11:27:38Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Dirik, A. E. ve Memon, N. (2013). “Selective robust image encryption for social networks”. ed. A. Dziech ve A. Czyewski. Communications in Computer and Information Science, Multimedia Communications, Services and Security, MCSS 2013, 368, 71-81. | en_US |
dc.identifier.issn | 978-3-642-38559-9 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.issn | 1865-0937 | - |
dc.identifier.uri | https://doi.org/10.1007/978-3-642-38559-9_7 | - |
dc.identifier.uri | http://hdl.handle.net/11452/32622 | - |
dc.description | Bu çalışma, 06-07 Haziran 2013 tarihleri arasında Krakow[Polonya]’da düzenlenen 6. International Conference on Multimedia Communications, Services and Security (MCSS)’da bildiri olarak sunulmuştur. | tr_TR |
dc.description.abstract | Current image encryption schemes do not achieve robustness to lossy compression and downsizing without sacrificing image quality. In this paper, we introduce a selective robust image encryption scheme for online social networks that provides a trade-off between robustness and security. With the selective encryption property, users have an option to share a blurred version of the original image and only a specific group of people having the right key can access the full content. Our method is based on the fact that image resizing and compression can be modeled as a low pass process which alters and/or removes high frequency components of image pixels. We achieve robustness to compression and downsizing by adjusting and shuffling DCT coefficients. Experimental results show that the proposed method can be applied in real world applications and social networks with satisfactory image quality. | en_US |
dc.description.sponsorship | Center for Interdisciplinary Studies in Security and Privacy, NYU, Abu Dhabi | en_US |
dc.description.sponsorship | AGH Univ Sci & Technol | en_US |
dc.description.sponsorship | Inst Elect & Elect Engn | en_US |
dc.description.sponsorship | AGH Univ Sci & Technol, Dept Telecommunicat | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Computer science | en_US |
dc.subject | Image encryption | en_US |
dc.subject | Robustness | en_US |
dc.subject | Privacy | en_US |
dc.subject | Social networks | en_US |
dc.subject | Data privacy | en_US |
dc.subject | Image quality | en_US |
dc.subject | Multimedia systems | en_US |
dc.subject | Robustness (control systems) | en_US |
dc.subject | Social networking (online) | en_US |
dc.subject | DCT coefficients | en_US |
dc.subject | High frequency components | en_US |
dc.subject | Image encryption scheme | en_US |
dc.subject | Image encryptions | en_US |
dc.subject | Lossy compressions | en_US |
dc.subject | On-line social networks | en_US |
dc.subject | Original images | en_US |
dc.subject | Selective encryption | en_US |
dc.subject | Cryptography | en_US |
dc.title | Selective robust image encryption for social networks | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.wos | 000341503800007 | tr_TR |
dc.identifier.scopus | 2-s2.0-84904607405 | tr_TR |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası | tr_TR |
dc.contributor.department | Uludağ Üniversitesi/Mühendislik Fakültesi/Elektrik ve Elektronik Mühendisliği Bölümü. | tr_TR |
dc.contributor.orcid | 0000-0002-6200-1717 | tr_TR |
dc.identifier.startpage | 71 | tr_TR |
dc.identifier.endpage | 81 | - |
dc.identifier.volume | 368 | tr_TR |
dc.relation.journal | Communications in Computer and Information Science, Multimedia Communications, Services and Security, MCSS 2013 | en_US |
dc.contributor.buuauthor | Dirik, Ahmet Emir | - |
dc.contributor.researcherid | K-6977-2012 | tr_TR |
dc.relation.collaboration | Yurt dışı | tr_TR |
dc.subject.wos | Computer science, artificial intelligence | en_US |
dc.subject.wos | Computer science, theory & methods | en_US |
dc.indexed.wos | CPCIS | en_US |
dc.indexed.scopus | Scopus | en_US |
dc.contributor.scopusid | 23033658100 | tr_TR |
dc.subject.scopus | Image Encryption; Cryptography; Hyperchaotic System | en_US |
Appears in Collections: | Scopus Web of Science |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.