A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection

被引:0
|
作者
Zhao, Ruoyu [1 ]
Wen, Wenying [2 ]
Zhu, Youwen [1 ]
Lan, Rushi [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Image & Graph Intelligent Proc, Guilin 541004, Peoples R China
基金
国家重点研发计划;
关键词
Privacy; Signal processing algorithms; Semantics; Perturbation methods; Vectors; Transform coding; Protection; Consumer friendliness; facial image; image transformation; JPEG compatibility; privacy preservation; GAN;
D O I
10.1109/LSP.2024.3452037
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Images in electronic devices may pose privacy threats since they can capture sensitive information about consumers. Meanwhile, face recognition (FR) systems are widely used, exacerbating these concerns. Some learning-based schemes have been proposed to protect the privacy of facial images. However, consumers might encounter challenges in implementing them due to specific requirements related to computing power and professional background. The non-learning semantic adversarial perturbation schemes address the aforementioned issues, but they are either irreversible or necessitate additional storage space. To this end, we propose a consumer-oriented image transformation scheme that can prevent the recognition of images by FR systems. It offers a consumer-friendly method compared to schemes that need high-performance equipment and specialized knowledge. The proposed scheme is implemented by reversible embedding the key to coefficients during the JPEG compression. The proposed scheme can be operated in general computing devices by ordinary consumers. The experiments demonstrated that facial images can be protected by the proposed scheme.
引用
收藏
页码:2280 / 2284
页数:5
相关论文
共 50 条
  • [1] The Future of Privacy: A Consumer-Oriented Approach to Managing Personal Data Online
    MacDermott, Siobhan
    Smith, J. R.
    THUNDERBIRD INTERNATIONAL BUSINESS REVIEW, 2013, 55 (01) : 3 - 12
  • [2] PRIVACY PROTECTION FOR SOCIAL MEDIA BASED ON A HIERARCHICAL SECRET IMAGE SHARING SCHEME
    Beugnon, Sebastien
    Puteaux, Pauline
    Puech, William
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 679 - 683
  • [3] Robust authentication and key agreement scheme preserving the privacy of secret key
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 274 - 280
  • [4] Image and Model Transformation with Secret Key for Vision Transformer
    Kiya, Hitoshi
    Iijima, Ryota
    Maungmaung, Aprilpyone
    Kinoshita, Yuma
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (01) : 2 - 11
  • [5] An image copyright protection scheme by encrypting secret data with the host image
    Asha Rani
    Balasubramanian Raman
    Multimedia Tools and Applications, 2016, 75 : 1027 - 1042
  • [6] An image copyright protection scheme by encrypting secret data with the host image
    Rani, Asha
    Raman, Balasubramanian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (02) : 1027 - 1042
  • [7] LBS-oriented location privacy protection model and scheme
    Yang, Song-Tao
    Ma, Chun-Guang
    Zhou, Chang-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 (08): : 116 - 124
  • [8] Reversible image visual transformation for privacy and content protection
    Wu, Hao-Tian
    Jia, Ruoyan
    Dugelay, Jean-Luc
    He, Junhui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 30863 - 30877
  • [9] Reversible image visual transformation for privacy and content protection
    Hao-Tian Wu
    Ruoyan Jia
    Jean-Luc Dugelay
    Junhui He
    Multimedia Tools and Applications, 2021, 80 : 30863 - 30877
  • [10] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535