An Unequal Image Privacy Protection Method Based on Saliency Detection

被引:1
作者
Tu, Rongxin [1 ]
Wen, Wenying [1 ]
Hua, Changsheng [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Management, Nanchang 330013, Jiangxi, Peoples R China
关键词
PERMUTATION-DIFFUSION; ENCRYPTION; SECURE; SYSTEM;
D O I
10.1155/2020/8842376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud platforms provide a good stage for storing and sharing big image data for users, although some privacy issues arise. Image encryption technology can prevent privacy leakage and can ensure secure image data sharing on cloud platforms. Hence, in this paper, an unequal encryption scheme based on saliency detection is proposed. First, based on the mechanism of visual perception and the theory of feature integration, the visual attention model is employed to realize the recognition of significant regions and insignificant regions. Then, a dynamic DNA encryption algorithm is proposed to exploit heavyweight encryption for significant regions, while semi-tensor product compressed sensing is introduced to exploit lightweight encryption and compression for insignificant regions. Experimental results demonstrate that the proposed framework can serve to secure big image data services.
引用
收藏
页数:13
相关论文
共 44 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[3]   Selective image encryption based on pixels of interest and singular value decomposition [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
DIGITAL SIGNAL PROCESSING, 2012, 22 (04) :648-663
[4]   A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function [J].
Byun, Jin Wook .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[5]   An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Zhang, Yushu ;
Chen, Yiran ;
Nixon, Kent W. .
OPTICS AND LASERS IN ENGINEERING, 2020, 124
[6]   A color image cryptosystem based on dynamic DNA encryption and chaos [J].
Chai, Xiuli ;
Fu, Xianglong ;
Gan, Zhihua ;
Lu, Yang ;
Chen, Yiran .
SIGNAL PROCESSING, 2019, 155 :44-62
[7]   Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform [J].
Chen, Hang ;
Tanougast, Camel ;
Liu, Zhengjun ;
Blondel, Walter ;
Hao, Boya .
OPTICS AND LASERS IN ENGINEERING, 2018, 107 :62-70
[8]   Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J].
Chen, Junxin ;
Zhu, Zhi-liang ;
Zhang, Li-bo ;
Zhang, Yushu ;
Yang, Ben-Qiang .
SIGNAL PROCESSING, 2018, 142 :340-353
[9]   Current Research Trends in Traditional Chinese Medicine Formula: A Bibliometric Review from 2000 to 2016 [J].
Chen, Yi-Bing ;
Tong, Xiao-Fang ;
Ren, Junge ;
Yu, Chun-Quan ;
Cui, Yuan-Lu .
EVIDENCE-BASED COMPLEMENTARY AND ALTERNATIVE MEDICINE, 2019, 2019
[10]   Index-based permutation-diffusion in multiple-image encryption using DNA sequence [J].
Enayatifar, Rasul ;
Guimaraes, Frederico Gadelha ;
Siarry, Patrick .
OPTICS AND LASERS IN ENGINEERING, 2019, 115 :131-140