Hierarchical-Masked Image Filtering for Privacy-Protection
نویسندگان
چکیده
منابع مشابه
Privacy Protection in Memory-Based Collaborative Filtering
We discuss the issue of privacy protection in collaborative filtering, focusing on the commonly-used memory-based approach. We show that the two main steps in collaborative filtering, being the determination of similarities and the prediction of ratings, can be performed on encrypted profiles, thereby securing the users’ private data. We list a number of variants of the similarity measures and ...
متن کاملHierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering
Privacy is an important challenge facing the growth of the Web and the propagation of various transaction models supported by it. Decentralized distributed models of computing are used to mitigate privacy breaches by eliminating a single point of failure. However, end-users can still be attacked in order to discover their private information. This work proposes using distributed hierarchical ne...
متن کاملImage privacy protection with secure JPEG transmorphing
Thanks to advancements in smart mobile devices and social media platforms, sharing photos and experiences has significantly bridged the authors’ lives, allowing them to stay connected despite distance and other barriers. Most approaches to protect image visual privacy focus on encrypting or permuting image data, which generate unreadable image or highly distorted visual effect and therefore may...
متن کاملChapter 11 PRIVACY PROTECTION IN COLLABORATIVE FILTERING BY ENCRYPTED COMPUTATION
We present a method to protect users’ privacy in collaborative filtering by performing the computations on encrypted data. We focus on the commonly-used memory-based approach, and show that the two main steps in collaborative filtering, being the determination of similarities and the prediction of ratings, can be performed on encrypted profiles. We discuss both user-based and item-based collabo...
متن کاملRobust image obfuscation for privacy protection in Web 2.0 applications
We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in Web 2.0 applications. It helps to protect the privacy of the users against threats caused by internet bots and web applications that extract biometric and other features from images...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2017
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.2016inp0012