Please use this identifier to cite or link to this item:
標題: Privacy Image Protection Using Fine-grained Technique
作者: 王楚帆
Chu-Fan Wang
關鍵字: Image access control
fine-grained access control
privacy protection
引用: 參考文獻 [1] A. D. Ker, 'Steganalysis of LSB Matching in Grayscale Images,' IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005. [2] A. Phadikar, M.K. Kundu, S.P. Maity, 'Quality Access Control of A Compressed Gray Scale Image,' Proc. of Conf. On Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG 08), India, pp. 13-19, 2008. [3] C. C. Chang and H. W. Tseng, 'A Steganographic Method for Digital Images Using Side Match,' Pattern Recognition Letters, vol. 25, no. 10, pp. 1431-1437, 2004. [4] C. C. Chang, W. C. Wu and Y. H. Chen, 'Joint Coding and Embedding Techniques for Multimedia Images,' Information Sciences, vol. 178, no. 18, pp. 3543-3556, 2008. [5] C. C. Chang, Y. H. Chen and T. D. Kieu, 'A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents,' ICIC Express Letters, Vol. 4, No.1, pp. 89-94, Feb. 2010. [6] C. C. Lin, Y. H. Chen and C. C. Chang, 'LSB-based High-Capacity Data Embedding Scheme for Images,' International Journal of Innovational Computing and Information Control (IJICIC), vol. 5, no. 11(B), pp. 4283-4289, 2009. [7] C. M. Wang, N. I. Wu, C. S. Tsai and M. S. Hwang, 'A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,' Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008. [8] Guillermito, Chi-square Steganography Test Program, available at [9] J. Fridrich, M. Goljan and R. Du, 'Detecting LSB Steganography in Color and Gray-Scale Images,' Magazine of IEEE Multimedia, Special Issue on Security, vol.8, no. 4, pp. 22 28, 2001. [10] J. Mielikainen, 'LSB Matching Revisited,' IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. [11] M. Pickering, L.E. Coria, P. Nasiopoulos, 'A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets', IEEE Proc. of Conf. on Consumer Electronics, Las Vegas, NV, pp. 1-2, 2007. [12] R. Grosbois, P. Gerbelot and T. Ebrahimi, 'Authentication and Access Control in The JPEG 2000 Compressed Domain,' SPIE Proc. of 46th Annual Meeting Applications of Digital Image Processing XXIV, San Diego, 95-104, 2001. [13] S. Imaizumi, O. Watanabe, M. Fujiyoshi, H. Kiya, 'Generalized Hierarchical Encryption of JPEG 2000 Code Streams for Access Control,' IEEE Proc. of Conf. On Image Processing, Genoa, Italy, pp. 1094-1097, 2005. [14] W. Perrizo, Q. Ding and A. Roy, 'Deriving high confidence rules from spatial data using Peano Cout Trees,' in Proc. Int. Conf. Web-Age Inf. Manage. Berlin, Germany: Springer-Verlag, vol. 2118, pp. 91-102, 2001.
摘要: Access control has been applied in multimedia database to preserve and protect the content which contains sensitive information. The past researches generate authorization rules to control the users who have permissions to access the contents in social photos, meeting photos, promotional photos, etc. It is not appropriate to use in some privacy scenarios (e.g., the increasing popularity of digital images being stored and managed by the service Google Street View). With low cost of maintenance, this paper integrates the data hiding technique into a fine-grained access control model to mask the sensitive information as well as enable to decode the masked results if necessary. Different kinds of images are treated as test images in the experiments. According to different authorizations, the different views for an image are presented. Also, the length of authorization path and the time is required in proposed scheme are shown in experiments. The experiments show the positive data to confirm the feasibility of the proposed scheme.
近年來,隨著網路的普及與發展,網路已不再只是傳遞訊息的工具,他已完全融入人們的生活中。雖然網路帶來了相當大的便利性,但相對地也存在著很多潛在的危險,由於網路是個開放且公開的環境,人們可以輕鬆地透過網路傳遞存取資料與影像,潛在的危險即是造成個人的隱私也許會因此而洩漏散播出去。台灣近年來也提出了個資法保護網路上的個人資訊安全,如何確保個人資訊免於隱私洩漏的疑慮是目前值得探討的議題。目前關於存取控制的研究大多專注於如何對一整份文件或是整張圖,而無法對影像做細緻化的存取控制(Fine-grained Access Control)。在本研究中,我們提出了一個保護隱私影像的存取機制,可以達到細緻化授權,將影像具隱私的內容加以加密,唯有特定被授權的角色,才有能力能將影像的加密區域內容還原成原本或近似影像內容。
其他識別: U0005-2611201316124400
文章公開時間: 2015-11-28
Appears in Collections:資訊管理學系



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.