A New Copyright- and Privacy-Protected Image Trading System Using a Novel Steganography-Based Visual Encryption Scheme
R.L. Lagendijk, Z. Erkin, and M. Barni, “Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation,” IEEE Signal Process. Mag., vol. 30, no. 1, pp. 82–105, Jan. 2013.
M. Kuribayashi, “Recent fingerprinting techniques with cryptographic protocol,” Signal Processing, S. Miron, ed., InTech, 2010.
I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, “Digital watermarking and steganography,” 2nd ed., Morgan Kaufmann Publishers, 2008.
B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C,” 2nd ed., John Wiley & Sons, 1996.
Y. Sengoku and H. Hioki, “A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking,” in ITC-CSCC, Sapporo, Japan, pp. D-W1-02, Jul. 15-18, 2012.
Y. Sengoku and H. Hioki, “An image segmentation method for privacy and copyright-aware image trading system,” IEICE Tech. Rep., vol. 111, no. 496, EMM2011-67, pp.19–24, Mar. 2012.
M. Okada, Y. Okabe, and T. Uehara, “A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking,” in Proc. IEEE CCNC, 2010.
S. Liu, M. Fujiyoshi, and H. Kiya, “An image trading system using amplitude-only images for privacy- and copyright-protection,” IEICE Trans. Fundamentals, vol. E96-A, pp. 1245–1252, Jun. 2013.
W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “A Generation Method of Amplitude-Only Images with Low Intensity Ranges,” IEICE Trans. Fundamentals, vol. E96-A, no. 6, pp. 1323–1330, Jun. 2013.
W. Sae-Tang, S. Liu, M. Fujiyoshi, and H. Kiya, “1D Frequency Transformation-Based Amplitude-Only Images for Copyright- and Privacy-Protection in Image Trading Systems,” ECTI-CIT, vol. 8, no. 2, Nov. 2014.
W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “Evaluation of Amplitude-Only Images for Copyright- and Privacy-Protected Image Trading Systems,” in ITC-CSCC, Phuket, Thailand, no. 1069, pp. 113–116, Jul. 1-4, 2014.
W. Sae-Tang and H. Kiya, “Hadamard Transform-Based Amplitude-Only Images for Image Trading Systems,” in IWAIT, Busan, Korea, no. 3C.5, Jan. 6-8, 2016.
W. Sae-Tang, M. Fujiyoshi, and H. Kiya, “Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System,” in ICAIP, Bangkok, Thailand, pp. 66–71, Aug. 25–27, 2017.
K. Stefan and F. Petitcolas, “Information hiding techniques for steganography and digital watermarking,” Artech house, 2000.
J. Neil F. and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer 31.2, 1998.
B. Shumeet, “Hiding images in plain sight: Deep steganography,” Advances in Neural Information Processing Systems, pp. 2069–2079, 2017.
A.V. Oppenheim and J.S. Lim, “The importance of phase in signals,” IEEE, vol. 69, pp. 529–541, May. 1981.
K. Ito, A. Nikaido, T. Aoki, E. Kosuge, R. Kawamata, and I. Kashima, “A dental radiograph recognition system using phase-only correlation for human identification,” IEICE Trans. Fundamentals, vol. E91-A, no. 1, pp. 298–305, Jan. 2008.
K. Ito, T. Aoki, H. Nakajima, K. Kobayashi, and T. Higuchi, “A palmprint recognition algorithm using phase-only correlation,” IEICE Trans. Fundamentals, vol. E91-A, no. 4, pp. 1023–1030, Apr. 2008.
K. Miyazawa, K. Ito, T. Aoki, K. Kobayashi, and H. Nakajima, “An effective approach for iris recognition using phase-based image matching,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 10, pp. 1741–1756, Oct. 2008.
Q.-S. Chen, M. Defrise, and F. Deconinck, “Symmetric phase-only matched filtering of Fourier-Mellin transforms for image registration and recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 12, pp. 1156–1168, Dec. 1994.
C.H. Knapp and G.C. Carter, “The generalized correlation method for estimation of time delay,” IEEE Trans. Acoustics, Speech, and Signal Process., vol. ASSP-24, no. 4, pp. 320–327, Aug. 1976.
C.D. Kuglin and D.C. Hines, “The phase correlation image alignment method,” Proc. IEEE Int. Conf. Cybernetics and Society, pp. 163–165, 1975.
K. Takita, T. Aoki, Y. Sasaki, T. Higuchi, and K. Kobayashi, “High accuracy subpixel image registration based on phase-only correlation,” IEICE Trans. Fundamentals, vol. E86-A, no. 8, pp. 1925–1934, Aug. 2003.
H. Amirshahi, S. Kondo, K. Ito, and T. Aoki, “An image completion algorithm using occlusion-free images from Internet photo sharing sites,” IEICE Trans. Fundamentals, vol. E91-A, no. 10, pp. 2918–2927, Oct. 2008.
I. Ito and H. Kiya, “One-time key based phase scrambling for phaseonly correlation between visually protected images,” EURASIP J. Inf. Security, vol. 2009, no. 841045, Jan. 2010.
I. Ito and H. Kiya, “Phase-only correlation based matching in scrambled domain for preventing illegal matching,” LNCS Transactions on Data Hiding and Multimedia Security V, vol. 6010/2010, pp. 51–69, Jun. 2010.
T. Tachibana, M. Fujiyoshi, and H. Kiya, “A watermarking scheme retaining the desired image quality in order to be applicable to watermarks with various distributions,” IEICE Trans. Inf. & Sys. (Japanese Edition), vol. J87-D-II, no. 3, pp. 850–859, Mar. 2004.
H. Inoue, A. Miyazaki, and T. katsura, “An image watermarking method based on the wavelet transform,” in Proc. IEEE ICIP, pp. 296–300, 1999.
Z. Zhang, Q. Sun, and W. Wong, “A novel lossy-to-lossless watermarking scheme for JPEG2000 images,” in Proc. IEEE ICIP, pp. 573–576, 2004.
Y. Chen and H. Huang, “A progressive image watermarking scheme for JPEG2000,” in Proc. IEEE IIH-MSP, pp. 230–233, 2012.
L. Sun, JC. Xu, XX. Zhang, and Y. Tian, “An image watermarking scheme using Arnold transform and fuzzy smooth support vector machine,” Math. Probl. Eng., vol. 2015, Article ID 931672.
FL. Liu and LL. Liu, “A new watermarking approach based on BP network in wavelet domain,” in Proc. IEEE CISP, pp. 1142–1145, Oct. 16-18, 2010.
S.D. Lin, S.C. Shie, and J.Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Comput. Stand. Interfaces, vol. 32, no. 1-2, pp. 54–60, Jan. 2010.
- There are currently no refbacks.