A game theory-based block image compression method in encryption domain

被引:0
|
作者
Shaohui Liu
Anand Paul
Guochao Zhang
Gwanggil Jeon
机构
[1] Harbin Institute of Technology,School of Computer Science and Technology
[2] Kyungpook National University,School of Computer Science and Engineering
[3] Incheon National University,Department of Embedded Systems Engineering, College of Information and Technology
来源
关键词
Image compression in encrypted domain; Image encryption; Privacy protection; Game theory; Network content security;
D O I
暂无
中图分类号
学科分类号
摘要
With the development of digital imaging technology and the prevalence of mobile devices with camera, internet privacy has been a growing concern for public. Especially in some private chat groups in social network, for example, Facebook, WeChat, and MySpace, some people want to share their personal images by internet service provider without leaking this information while the internet service provider can also take some additional measures on these images, for example, reducing the network bandwidth. How to provide technologies or software with such functionalities, usually conflicting goals, becomes increasingly urgent in both academia and industry. Image encryption is a choice; however, it does not provide the additional function needed by internet service providers. Recently, game theory is widely used in network security to solve such problem with conflicting goals. In fact, there is a game theory between users and service providers. This paper proposes a block-based image compression method in encrypted domain which provides not only the privacy protection capability but also the additional operation capability needed by internet service providers. This block-based method can be formulated as a game theoretical problem and can be optimized by game theory. First, the image to be shared will be encrypted in block-by-block way by owner with simple encryption operation. Second, the service providers can send the part or full of the encrypted image stream according to the available bandwidth with an adaptive parameter sets. Finally, the intended receivers can decrypt the received encrypted stream to recover the image. Extensive experiments show that the proposed algorithm improves the compression performance compared with the-state-of algorithms.
引用
收藏
页码:3353 / 3372
页数:19
相关论文
共 50 条
  • [41] Game theory-based performance assessment of police personnel
    Tariq Ahamed Ahanger
    Munish Bhatia
    Abdulaziz Aldaej
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 511 - 526
  • [42] Game Theory-Based Network Selection: Solutions and Challenges
    Trestian, Ramona
    Ormond, Olga
    Muntean, Gabriel-Miro
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04): : 1212 - 1231
  • [43] An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL)
    Gan, Zhihua
    Chai, Xiuli
    Zhang, Jitong
    Zhang, Yushu
    Chen, Yiran
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (17): : 14113 - 14141
  • [44] Block based learned image compression
    Aziz, Roohan
    Wagan, Asim Imdad
    Islam, Noman
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 26495 - 26509
  • [45] Game theory-based Cooperation of Process Planning and Scheduling
    Li, W. D.
    Gao, L.
    Li, X. Y.
    Guo, Y.
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 841 - +
  • [46] Block based learned image compression
    Roohan Aziz
    Asim Imdad Wagan
    Noman Islam
    [J]. Multimedia Tools and Applications, 2023, 82 : 26495 - 26509
  • [47] Game theory-based metaheuristics for structural design optimization
    Mahjoubi, Soroush
    Bao, Yi
    [J]. COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2021, 36 (10) : 1337 - 1353
  • [48] Game Theory-Based Network Rumor Spreading Model
    Li, Mingcai
    Liu, Fengming
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 89 - 94
  • [49] Game Theory-Based Requirements Analysis in the i* Framework
    Subramanian, Chitra M.
    Krishna, Aneesh
    Kaur, Arshinder
    [J]. COMPUTER JOURNAL, 2018, 61 (03): : 427 - 446
  • [50] The optical image compression and encryption method based on Fresnel diffraction and discrete wavelet transform
    Wu, Chuhan
    Chang, Jun
    Quan, Chenggen
    Zhang, Xiaofang
    Zhang, Yongjian
    [J]. RESULTS IN OPTICS, 2020, 1