Presentation | 2014-09-11 A method of perceptual encryption and its efficient key management for JPEG / Motion JPEG images Kenta KURIHARA, Yuko SAITO, Shoko IMAIZUMI, Sayaka SHIOTA, Hitoshi KIYA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPEG or motion JPEG compression. Perceptual encryption is a processing technique which makes an image difficult to recognize visually. In comparison with number theory-based encryption methods, perceptual encryption has a high flexibility for the processing such as it enables an image to be compressed after the encryption. The proposed method is a scheme of performing the block-based perceptual encryption, which is suitable for JPEG compression. It is confirmed that the quality when compressing the visually encrypted image generated by the proposed method is almost same as that when compressing the original one. Also, as an efficient key management for the proposed encryption, we consider a scheme using a hash function to generate encryption keys. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | JPEG compression / Perceptual encryption / Key management / Hash function |
Paper # | SIS2014-53 |
Date of Issue |
Conference Information | |
Committee | SIS |
---|---|
Conference Date | 2014/9/4(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Smart Info-Media Systems (SIS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A method of perceptual encryption and its efficient key management for JPEG / Motion JPEG images |
Sub Title (in English) | |
Keyword(1) | JPEG compression |
Keyword(2) | Perceptual encryption |
Keyword(3) | Key management |
Keyword(4) | Hash function |
1st Author's Name | Kenta KURIHARA |
1st Author's Affiliation | Faculty of System Design, Tokyo Metropolitan University() |
2nd Author's Name | Yuko SAITO |
2nd Author's Affiliation | Faculty of System Design, Tokyo Metropolitan University |
3rd Author's Name | Shoko IMAIZUMI |
3rd Author's Affiliation | Graduate School of Engineering, Chiba University |
4th Author's Name | Sayaka SHIOTA |
4th Author's Affiliation | Faculty of System Design, Tokyo Metropolitan University |
5th Author's Name | Hitoshi KIYA |
5th Author's Affiliation | Faculty of System Design, Tokyo Metropolitan University |
Date | 2014-09-11 |
Paper # | SIS2014-53 |
Volume (vol) | vol.114 |
Number (no) | 205 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |