Privacy-preserving inpainting for outsourced image

نویسندگان

چکیده

In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image scheme are proposed. Different with conventional in plaintext domain, there two entities, that is, content owner restorer, our framework. Content first encrypts his or her damaged privacy protection outsources the encrypted, to who may be cloud server powerful computation capability. Image restorer performs encrypted domain sends inpainted back authorized receiver, can acquire final result through decryption. scheme, assist Johnson–Lindenstrauss transform preserve Euclidean distance between vectors before after encryption, best-matching block smallest current found utilized patch filling Paillier-encrypted image. To eliminate mosaic effect decryption, weighted mean filtering is conducted Paillier homomorphic properties. Experimental results show effectively applied secure computing, proposed achieves comparable visual quality some typical schemes domain.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving face recognition with outsourced computation

Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individual...

متن کامل

Practical and Privacy-Preserving Policy Compliance for Outsourced Data

A recently considered scenario for data outsourcing allows performing database queries in the following three-party model: a client interested in making database queries, a data owner providing its database for client access, and a server (e.g., a cloud server) holding the (encrypted) outsourced data and helping both other parties. In this scenario, a natural problem is that of designing effici...

متن کامل

Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation

Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he has capacity for her massive data set, of size n, whereas her private storage is much smaller—say, of size O(n), for some constant r > 1. Alice trusts Bob to maintain her data, but she would like to keep its contents private. She can encrypt her data, of course, but she also wishes to keep her acce...

متن کامل

Privacy-Preserving in Outsourced Transaction Databases from Association Rules Mining

Data mining-as-a-service has been selected as considerable research issue by researchers. An organization (data owner) can outsource its mining needs like resources or expertise to a third party service provider (server). However, both the association rules and the items of the outsourced transaction database are private property of data owner. The data owner encrypts its data, send data and mi...

متن کامل

Privacy-Preserving Verification of Aggregate Queries on Outsourced Database

It is often desirable to be able to guarantee the integrity of historical data, ensuring that any subsequent modifications to the data can be detected. It would be especially convenient to extend such proofs of integrity to certain computations performed later using the historic data. We approach this question in the context of outsourced databases, where a data owner delegates the ability to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed Sensor Networks

سال: 2021

ISSN: ['1550-1329', '1550-1477']

DOI: https://doi.org/10.1177/15501477211059092