Secure Image Processing
نویسنده
چکیده
OF THESIS SECURE IMAGE PROCESSING In todays heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Platforms that support such computation on image processing purposes are called secure image processing protocols. In this thesis, we propose a new security model, called quasi information theoretic (QIT) security. Under the proposed model efficient protocols on two basic image processing algorithms – linear filtering and thresholding – are developed. For both problems we consider two situations: 1) only two parties are involved where one holds the data and the other possesses the processing algorithm; 2) an additional non-colluding third party exists. Experiments show that our proposed protocols improved the computational time significantly compared with the classical cryptographical couterparts as well as providing reasonable amount of security as proved in the thesis.
منابع مشابه
SEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملEnhance Performance of Secure Image Using Wavelet Compression
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time sec...
متن کاملSecure Fingerprint Verification Based on Image Processing Segmentation Using Computational Geometry Algorithms
In this paper, fingerprint segmentation for secure Internet verification purposes is investigated. The novel application of computational geometry algorithms in the fingerprint segmentation stage showed that the extracted feature (characteristic polygon) may be used as a secure and accurate method for fingerprint-based verification over the Internet. On the other hand the proposed method promis...
متن کاملRobust Chaotic Digital Image Watermarking Scheme based on RDWT and SVD
In recent years chaos has received a great deal of attention from the researches specialized in communications, signal and image processing. The complexity property of the chaotic signal raised the idea of using such signals in secure communications. Digital image watermarking is a technique mainly developed for copyright protection and image authentication and it can be considered as one appli...
متن کاملThe Combinational Use Of Knowledge-Based Methods and Morphological Image Processing in Color Image Face Detection
The human facial recognition is the base for all facial processing systems. In this work a basicmethod is presented for the reduction of detection time in fixed image with different color levels.The proposed method is the simplest approach in face spatial localization, since it doesn’trequire the dynamics of images and information of the color of skin in image background. Inaddition, to do face...
متن کامل