Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems
نویسندگان
چکیده
منابع مشابه
Efficient Grayscale Image Encryption Then Compression System
In secret communication, images are widely used and the major issues are how to protect the image and also reduce size of the image in order to maximize the network utilization. Various techniques are there in order to secure the image and to reduce the size of the image. In many practical scenarios, encryption of an image has to be conducted before the image compression. In proposed scheme, bo...
متن کاملDesigning an Efficient Image Encryption-then Compression System
In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-thencompression (ETC) system, where both lossless and lossy comp...
متن کاملSurvey on social networking services
The social computing, such as social networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize. The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration and sharing of the knowledge through a variety of SNSs, such as text, video ...
متن کاملOn sampling social networking services
This article aims at summarizing existing methods for sampling social networking services and proposing a faster confidence interval for related sampling methods. Social networking services (SNSs), such as Facebook and Twitter, are an important part of the current Internet culture. Collecting samples from these networks, therefore, is necessary for learning more about sociological or cultural i...
متن کاملDecentralizing Social Networking Services
Online Social Networks (OSN) of today represent centralized repositories of personally idenfiable information (PII) of their users. Considering their impressive growth they arguably are the most popular service on the Internet, both by technology savvy but even more by comparibly inexpert audiences, today. Being voluntarily maintained and automatically exploitable, they are a promising and chal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2019
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.2018mup0001