[1] |
Kate k.1.8 billion images are uploaded every day[N/OL].[2020-03-02].https://www.dailydot.com/debug/mary-meeker-photo-report.
|
[2] |
Li Meng. Lakala:Koala’s credit investigation is suspected of illegally caching citizens’ personal information for a profit of 38 million yuan[N/OL].Dianshang Bao[2019-11-22].
|
|
http://www.xianzhaiwang.cn/all/621439.html.(in Chinese)
|
[3] |
Tierney M,Ian S,Christoph B,et al.Cryptagram:Photo privacy for online social media [C]∥Proc of the 1st ACM Conference on Online Social Networks,2013:75-88.
|
[4] |
Yuan L,Pavel K,Touradj E.Secure JPEG scrambling enabl- ing privacy in photo shar- ing [C]∥Proc of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG),2015:1-6.
|
[5] |
Zhang L, Taeho J,Cihang L,et al.POP:Privacy-preserving outsourced photo sharing and searching for mobile devices [C]∥Proc of the 35th IEEE International Conference on Distributed Computing Systems,2015:308-317.
|
[6] |
He J P, Liu B, Kong D G,et al.PUPPIES:Transformation-supported personalized privacy preserving partial image shar-ing [C]∥Proc of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),2016:359-370.
|
[7] |
Lin Y, Ebrahimi T. Image privacy protection with secure JPEG transmorphing [J].IET Signal Processing,2017,11(9):1031-1038.
|
[8] |
Liu L, Lei Y,Wang D.A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation [J].IEEE Access,2020,8(2):27361-27374.
|
[9] |
Wei Lian-suo,Hu Xian-cheng,Chen Qi-qi,et al.A color image encryption algorithm based on new chaos and matrix convolution operation [J].Computer Engineering & Science,2020,42(1):80-88.(in Chinese)
|
[10] |
Wang Lei,Xue Wei.An image encryption algorithm based on spatiotemporal chaos and wavelet transform [J].Computer Engineering & Science,2018,40(5):856-862.(in Chinese)
|
[11] |
Wei Wei-yi, Wang Yu,A Cheng-feng.A texture synthesis coverless information hiding method based on LBP [J].Computer Engineering & Science,2019,41(11):1961-1967.(in Chinese)
|
[12] |
Marohn B, Charles V W,Feng W C,et al.Approximate thumbnail preserving encryption [C]∥Proc of the 1st International Workshop on Multimedia Privacy and Security,2017:33-43.
|
[13] |
Charles V W,Feng W C,Feng L. Thumbnail-preserving encryption for JPEG [C]∥Proc of the 3rd ACM Workshop on Information Hiding and Multimedia Security,2015:141-146.
|
[14] |
Gregory R L. Knowledge in perception and illusion [J].Philosophical Transactions:Biological Sciences,1997,352(1358):1121-1127.
|
[15] |
Kinjo H,Joan G S.Does the generation effect occur for pictures [J].The American Journal of Psychology,2000,113(1):95-121.
|
[16] |
Harada A,Takeo I,Tadanori M,et al.A user authentication system using schema of visual memory [C]∥Proc of International Workshop on Biologically Inspired Approaches to Advanced Information Technology,2006:338-345.
|
[17] |
Hayashi E, Rachna D, Nicolas C, et al.Use your illusion: Secure authentication usable anywhere [C]∥Proc of the 4th Symposium on Usable Privacy and Security,2008:35-45.
|
[18] |
von Zezschwitz E,Sigrid E,Heinrich H,et al.You can’t watch this! Privacy-respectful photo browsing on smartphones [C]∥Proc of the 2016 CHI Conference on Human Factors in Computing Systems,2016:4320-4324.
|
[19] |
Tajik K, Gunasekaran A, Dutta R,et al.Balancing image privacy and usability with thumbnail-preserving encryption [C]∥Proc of the 26th Annual Network and Distributed Systems Security Symposium,2019:1.
|
[20] |
Bellare M, Ristenpart T, Rogaway P, et al. Format- preserving encryption [C]∥Proc of International Workshop on Selected Areas in Cryptography,2009:295-312.
|
|
附中文参考文献:
|
[2] |
李梦.考拉征信被查涉嫌非法缓存公民个人信息获利3800万元[N/OL].电商报[2019-11-20].http://www.xianzhaiwang.cn/all/621439.html.
|
[9] |
魏连锁,胡现成,陈齐齐,等.基于新混沌与矩阵卷积运算的彩色图像加密算法 [J].计算机工程与科学,2020,42(1):80-88.
|
[10] |
王磊,薛伟.基于时空混沌和小波变换的图像加密算法 [J].计算机工程与科学,2018,40(5):856-862.
|
[11] |
魏伟一,王瑜,阿成凤.一种基于LBP的纹理合成无载体信息隐藏方法 [J].计算机工程与科学,2019,41(11):1961-1967.
|