Combining Forensics and Privacy Requirements ...
Type de document :
Communication dans un congrès avec actes
Titre :
Combining Forensics and Privacy Requirements for Digital Images
Auteur(s) :
Puteaux, Pauline [Auteur]
Image & Interaction [ICAR]
Itier, Vincent [Auteur]
Ecole nationale supérieure Mines-Télécom Lille Douai [IMT Lille Douai]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]
Centre National de la Recherche Scientifique [CNRS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Image & Interaction [ICAR]
Itier, Vincent [Auteur]
Ecole nationale supérieure Mines-Télécom Lille Douai [IMT Lille Douai]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Bas, Patrick [Auteur]

Centre National de la Recherche Scientifique [CNRS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Titre de la manifestation scientifique :
EUSIPCO 2021 - 29th European Signal Processing Conference
Ville :
Dublin (virtual)
Pays :
Irlande
Date de début de la manifestation scientifique :
2021-08-23
Date de publication :
2021
Mot(s)-clé(s) en anglais :
Forensics
Privacy
Visual confidentiality
Selective encryption
Trade-off
Privacy
Visual confidentiality
Selective encryption
Trade-off
Discipline(s) HAL :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Résumé en anglais : [en]
This paper proposes to study the impact of image selective encryption on both forensics and privacy preserving mechanisms. The proposed selective encryption scheme works independently on each bitplane by encrypting the s ...
Lire la suite >This paper proposes to study the impact of image selective encryption on both forensics and privacy preserving mechanisms. The proposed selective encryption scheme works independently on each bitplane by encrypting the s most significant bits of each pixel. We show that this mechanism can be used to increase privacy by mitigating image recognition tasks. In order to guarantee a trade-off between forensics analysis and privacy, the signal of interest used for forensics purposes is extracted from the 8−s least significant bits of the protected image. We show on the CASIA2 database that good tampering detection capabilities can be achieved for s ∈ {3,. .. , 5} with an accuracy above 80% using SRMQ1 features, while preventing class recognition tasks using CNN with an accuracy smaller than 50%.Lire moins >
Lire la suite >This paper proposes to study the impact of image selective encryption on both forensics and privacy preserving mechanisms. The proposed selective encryption scheme works independently on each bitplane by encrypting the s most significant bits of each pixel. We show that this mechanism can be used to increase privacy by mitigating image recognition tasks. In order to guarantee a trade-off between forensics analysis and privacy, the signal of interest used for forensics purposes is extracted from the 8−s least significant bits of the protected image. We show on the CASIA2 database that good tampering detection capabilities can be achieved for s ∈ {3,. .. , 5} with an accuracy above 80% using SRMQ1 features, while preventing class recognition tasks using CNN with an accuracy smaller than 50%.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Projet ANR :
Collections :
Source :
Fichiers
- https://hal.archives-ouvertes.fr/hal-03160123v2/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-03160123v2/document
- Accès libre
- Accéder au document
- https://hal.archives-ouvertes.fr/hal-03160123v2/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- EUSIPCO2021.pdf
- Accès libre
- Accéder au document