{"title":"带有关联缩略图的图像加密方案","authors":"Shanwu Shao, Ji Li, Ping Shao, Xiangyuan Zhu","doi":"10.1109/ICSAI57119.2022.10005351","DOIUrl":null,"url":null,"abstract":"Image encryption can protect cloud image privacy. However, the usability of encrypted images has not received much attention. To this end, an image encryption scheme with an associated thumbnail is proposed, it generates both the encrypted image and the associated thumbnail, which can be stored in the cloud. The associated thumbnail is only partially encrypted, which has a small capacity, and maintains certain usability with less download and decryption time. Therefore, the users can download and decrypt the associated thumbnail instead of the encrypted image to meet general usage requirements, and most of the time there is no need to download the encrypted image from the cloud. Experiments show that this scheme balances image privacy protection and usability, and can bring convenience to the browsing and management of encrypted images in the cloud.","PeriodicalId":339547,"journal":{"name":"2022 8th International Conference on Systems and Informatics (ICSAI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Image Encryption Scheme with the Associated Thumbnail\",\"authors\":\"Shanwu Shao, Ji Li, Ping Shao, Xiangyuan Zhu\",\"doi\":\"10.1109/ICSAI57119.2022.10005351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Image encryption can protect cloud image privacy. However, the usability of encrypted images has not received much attention. To this end, an image encryption scheme with an associated thumbnail is proposed, it generates both the encrypted image and the associated thumbnail, which can be stored in the cloud. The associated thumbnail is only partially encrypted, which has a small capacity, and maintains certain usability with less download and decryption time. Therefore, the users can download and decrypt the associated thumbnail instead of the encrypted image to meet general usage requirements, and most of the time there is no need to download the encrypted image from the cloud. Experiments show that this scheme balances image privacy protection and usability, and can bring convenience to the browsing and management of encrypted images in the cloud.\",\"PeriodicalId\":339547,\"journal\":{\"name\":\"2022 8th International Conference on Systems and Informatics (ICSAI)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th International Conference on Systems and Informatics (ICSAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAI57119.2022.10005351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Systems and Informatics (ICSAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAI57119.2022.10005351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Image Encryption Scheme with the Associated Thumbnail
Image encryption can protect cloud image privacy. However, the usability of encrypted images has not received much attention. To this end, an image encryption scheme with an associated thumbnail is proposed, it generates both the encrypted image and the associated thumbnail, which can be stored in the cloud. The associated thumbnail is only partially encrypted, which has a small capacity, and maintains certain usability with less download and decryption time. Therefore, the users can download and decrypt the associated thumbnail instead of the encrypted image to meet general usage requirements, and most of the time there is no need to download the encrypted image from the cloud. Experiments show that this scheme balances image privacy protection and usability, and can bring convenience to the browsing and management of encrypted images in the cloud.