Image camouflage based on Generative Model

10/21/2017
by   Xintao Duan, et al.
0

To protect image contents, most existing encryption algorithms are designed to transform an original image into a texture-like or noise-like image which is, however, an obvious visual sign indicating the presence of an encrypted image and thus results in a significantly large number of attacks. To address this problem, we propose a new image encryption concept that a meaningful normal image that is independent of the original image and the corresponding well-trained generative model can generate the same image as the original image in this paper, instead of transmitting the original image, to achieve the effect of disguising the original image. This image camouflage method not only solves the problem of obviously visual implication, but also guarantees the security of the information.

READ FULL TEXT

page 1

page 3

page 4

research
03/09/2023

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

In this paper, we propose a novel generative model-based attack on learn...
research
06/27/2021

Secure Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

Reversible data hiding in encrypted images (RDH-EI) has attracted increa...
research
10/13/2021

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

We introduce a new type of format-transforming encryption where the form...
research
02/10/2018

Coverless information hiding based on Generative Model

A new coverless image information hiding method based on generative mode...
research
11/18/2018

Distribution Discrepancy Maximization for Image Privacy Preserving

With the rapid increase in online photo sharing activities, image obfusc...
research
11/05/2020

A multi-level approach with visual information for encrypted H.265/HEVC videos

High-efficiency video coding (HEVC) encryption has been proposed to encr...
research
02/15/2023

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion

Due to the strong correlation between adjacent pixels, most image encryp...

Please sign up or login with your details

Forgot password? Click here to reset