메뉴 건너뛰기




Volumn 2015-August, Issue , 2015, Pages 185-190

Privacy-preserving photo sharing based on a secure JPEG

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPLEX NETWORKS; DATA PRIVACY; NETWORK ARCHITECTURE;

EID: 84943227753     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2015.7179382     Document Type: Conference Paper
Times cited : (42)

References (28)
  • 4
    • 84861669897 scopus 로고    scopus 로고
    • A general framework for managing and processing live video data with privacy protection
    • A. J. Aved and K. A. Hua, "A general framework for managing and processing live video data with privacy protection, "Multimedia Syst. , vol. 18, no. 2, pp. 123-143, 2012
    • (2012) Multimedia Syst , vol.18 , Issue.2 , pp. 123-143
    • Aved, A.J.1    Hua, K.A.2
  • 6
  • 10
    • 79955412469 scopus 로고    scopus 로고
    • Secure image encryption without size limitation using Arnold transform and random strategies
    • Z. Tang and X. Zhang, "Secure image encryption without size limitation using Arnold transform and random strategies. "Journal of Multimedia, vol. 6, no. 2, pp. 202-206, 2011
    • (2011) Journal of Multimedia , vol.6 , Issue.2 , pp. 202-206
    • Tang, Z.1    Zhang, X.2
  • 11
    • 84872938866 scopus 로고    scopus 로고
    • A novel digital image encryption method based on one-dimensional random scrambling
    • Q. Sun, P. Guan, Y. Qiu, and Y. Xue, "A novel digital image encryption method based on one-dimensional random scrambling. "in FSKD. IEEE, 2012, pp. 1669-1672
    • (2012) FSKD. IEEE , pp. 1669-1672
    • Sun, Q.1    Guan, P.2    Qiu, Y.3    Xue, Y.4
  • 13
    • 33750579796 scopus 로고    scopus 로고
    • Toward a Secure JPEG
    • F. Dufaux and T. Ebrahimi, "Toward a Secure JPEG, "in Proc. SPIE, vol. 6312, 2006, pp. 63 120K-63 120K-8
    • (2006) Proc. SPIE , vol.6312 , pp. 63120K-63120K8
    • Dufaux, F.1    Ebrahimi, T.2
  • 16
    • 35348839742 scopus 로고    scopus 로고
    • Overexposed?: Privacy patterns and considerations in online and mobile photo sharing
    • M. B. Rosson and D. J. Gilmore, Eds ACM
    • S. Ahern, D. Eckles, N. Good, S. King, M. Naaman, and R. Nair, "Overexposed?: Privacy patterns and considerations in online and mobile photo sharing. "in CHI, M. B. Rosson and D. J. Gilmore, Eds. ACM, 2007, pp. 357-366
    • (2007) CHI , pp. 357-366
    • Ahern, S.1    Eckles, D.2    Good, N.3    King, S.4    Naaman, M.5    Nair, R.6
  • 18
    • 85091930363 scopus 로고    scopus 로고
    • Cybercasing the joint: On the privacy implications of geo-tagging
    • ser. HotSec10. Berkeley, CA, USA: USENIX Association
    • G. Friedland and R. Sommer, "Cybercasing the joint: On the privacy implications of geo-tagging, "in Proceedings of the 5th USENIX Conference on Hot Topics in Security, ser. HotSec10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-8
    • (2010) Proceedings of the 5th USENIX Conference on Hot Topics in Security , pp. 1-8
    • Friedland, G.1    Sommer, R.2
  • 20
    • 84860735258 scopus 로고    scopus 로고
    • Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks
    • 5th ACM Workshop on Social Network Systems, Bern, Switzerland, April 2012
    • L. A. Cutillo, R. Molva, and M. Ö nen, "Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks, " in SNS 2012, 5th ACM Workshop on Social Network Systems, Bern, Switzerland, April 2012
    • (2012) SNS
    • Cutillo, L.A.1    Molva, R.2    Onen, M.3
  • 24
    • 70450193588 scopus 로고    scopus 로고
    • Understanding images of groups of people
    • A. Gallagher and T. Chen, "Understanding images of groups of people, " in Proc. CVPR, 2009
    • (2009) Proc. CVPR
    • Gallagher, A.1    Chen, T.2
  • 28
    • 84943265692 scopus 로고    scopus 로고
    • Nov. 2012, US Patent App 13/419 065. The Third International Workshop on Security and Privacy in Big Data (BigSecurity
    • V. Narayanan, G. Rose, and L. Dondeti, "Social network based PKI authentication, "Nov. 2012, US Patent App. 13/419, 065. [Online]. Available: http://www. google. com/patents/US20120278625 The Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015) 190
    • (2015) Social Network Based PKI Authentication , pp. 190
    • Narayanan, V.1    Rose, G.2    Dondeti, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.