Loading…
Object detection framework to generate secret shares
Nowadays, the sharing of images via the Internet has been widely used. The security concern during transmission of images has been a very important issue, as images contain a lot of crucial information. To prevent access to this information by any unauthorized user various encryption schemes have be...
Saved in:
Published in: | Multimedia tools and applications 2020-09, Vol.79 (33-34), p.24685-24706 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3 |
container_end_page | 24706 |
container_issue | 33-34 |
container_start_page | 24685 |
container_title | Multimedia tools and applications |
container_volume | 79 |
creator | Agarwal, Ayushi Deshmukh, Maroti Singh, Maheep |
description | Nowadays, the sharing of images via the Internet has been widely used. The security concern during transmission of images has been a very important issue, as images contain a lot of crucial information. To prevent access to this information by any unauthorized user various encryption schemes have been developed. An image may consist of a large number of pixels and the encryption of the whole image takes more time. To overcome this problem, we proposed an algorithm that focuses on encryption of only those objects which contain the major information of an image instead of encrypting the complete image, this saves the time required in encryption as only the objects contained in the image are encrypted. The proposed algorithm exploits the use of object detection and image secret sharing. Object detection is done using the “You Only Look Once (YOLO)” algorithm. Further, the objects detected are encrypted using (n,n) modular arithmetic secret sharing scheme. The quantitative measures like correlation, SSIM, RMSE, PSNR has been used to evaluate the performance of the proposed algorithm on COCO dataset. The experimental results show that the proposed algorithm is lossless i.e. original and reconstructed images are exactly the same. The proposed algorithm is efficient and can be used in a broad range of applications. |
doi_str_mv | 10.1007/s11042-020-09169-x |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2435937571</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2435937571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3</originalsourceid><addsrcrecordid>eNp9kMFOwzAQRC0EEqXwA5wicTbs2rEdH1EFFKlSL3C2nGRTWmhSbFeUv8cQJG6cZg4zs6vH2CXCNQKYm4gIpeAggINFbfnhiE1QGcmNEXicvayAGwV4ys5i3ACgVqKcsHJZb6hJRUspy3roiy74LX0M4bVIQ7GinoJPVERqAqUivvhA8ZyddP4t0sWvTtnz_d3TbM4Xy4fH2e2CNxJt4lipVhGBFJWQpdcttQTCGK1Fl9_q2lIg6KpWVa1RWisApPEKFLRIle3klF2Nu7swvO8pJrcZ9qHPJ50opbLSKIM5JcZUE4YYA3VuF9ZbHz4dgvum40Y6LtNxP3TcIZfkWIo53K8o_E3_0_oChlZmHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2435937571</pqid></control><display><type>article</type><title>Object detection framework to generate secret shares</title><source>ABI/INFORM Collection</source><source>Springer Nature</source><creator>Agarwal, Ayushi ; Deshmukh, Maroti ; Singh, Maheep</creator><creatorcontrib>Agarwal, Ayushi ; Deshmukh, Maroti ; Singh, Maheep</creatorcontrib><description>Nowadays, the sharing of images via the Internet has been widely used. The security concern during transmission of images has been a very important issue, as images contain a lot of crucial information. To prevent access to this information by any unauthorized user various encryption schemes have been developed. An image may consist of a large number of pixels and the encryption of the whole image takes more time. To overcome this problem, we proposed an algorithm that focuses on encryption of only those objects which contain the major information of an image instead of encrypting the complete image, this saves the time required in encryption as only the objects contained in the image are encrypted. The proposed algorithm exploits the use of object detection and image secret sharing. Object detection is done using the “You Only Look Once (YOLO)” algorithm. Further, the objects detected are encrypted using (n,n) modular arithmetic secret sharing scheme. The quantitative measures like correlation, SSIM, RMSE, PSNR has been used to evaluate the performance of the proposed algorithm on COCO dataset. The experimental results show that the proposed algorithm is lossless i.e. original and reconstructed images are exactly the same. The proposed algorithm is efficient and can be used in a broad range of applications.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-09169-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Computer Communication Networks ; Computer Science ; Correlation analysis ; Data Structures and Information Theory ; Encryption ; Image reconstruction ; Image transmission ; Multimedia Information Systems ; Object recognition ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2020-09, Vol.79 (33-34), p.24685-24706</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3</citedby><cites>FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2435937571/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2435937571?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Agarwal, Ayushi</creatorcontrib><creatorcontrib>Deshmukh, Maroti</creatorcontrib><creatorcontrib>Singh, Maheep</creatorcontrib><title>Object detection framework to generate secret shares</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Nowadays, the sharing of images via the Internet has been widely used. The security concern during transmission of images has been a very important issue, as images contain a lot of crucial information. To prevent access to this information by any unauthorized user various encryption schemes have been developed. An image may consist of a large number of pixels and the encryption of the whole image takes more time. To overcome this problem, we proposed an algorithm that focuses on encryption of only those objects which contain the major information of an image instead of encrypting the complete image, this saves the time required in encryption as only the objects contained in the image are encrypted. The proposed algorithm exploits the use of object detection and image secret sharing. Object detection is done using the “You Only Look Once (YOLO)” algorithm. Further, the objects detected are encrypted using (n,n) modular arithmetic secret sharing scheme. The quantitative measures like correlation, SSIM, RMSE, PSNR has been used to evaluate the performance of the proposed algorithm on COCO dataset. The experimental results show that the proposed algorithm is lossless i.e. original and reconstructed images are exactly the same. The proposed algorithm is efficient and can be used in a broad range of applications.</description><subject>Algorithms</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Correlation analysis</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Image reconstruction</subject><subject>Image transmission</subject><subject>Multimedia Information Systems</subject><subject>Object recognition</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kMFOwzAQRC0EEqXwA5wicTbs2rEdH1EFFKlSL3C2nGRTWmhSbFeUv8cQJG6cZg4zs6vH2CXCNQKYm4gIpeAggINFbfnhiE1QGcmNEXicvayAGwV4ys5i3ACgVqKcsHJZb6hJRUspy3roiy74LX0M4bVIQ7GinoJPVERqAqUivvhA8ZyddP4t0sWvTtnz_d3TbM4Xy4fH2e2CNxJt4lipVhGBFJWQpdcttQTCGK1Fl9_q2lIg6KpWVa1RWisApPEKFLRIle3klF2Nu7swvO8pJrcZ9qHPJ50opbLSKIM5JcZUE4YYA3VuF9ZbHz4dgvum40Y6LtNxP3TcIZfkWIo53K8o_E3_0_oChlZmHA</recordid><startdate>20200901</startdate><enddate>20200901</enddate><creator>Agarwal, Ayushi</creator><creator>Deshmukh, Maroti</creator><creator>Singh, Maheep</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20200901</creationdate><title>Object detection framework to generate secret shares</title><author>Agarwal, Ayushi ; Deshmukh, Maroti ; Singh, Maheep</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Correlation analysis</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Image reconstruction</topic><topic>Image transmission</topic><topic>Multimedia Information Systems</topic><topic>Object recognition</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Agarwal, Ayushi</creatorcontrib><creatorcontrib>Deshmukh, Maroti</creatorcontrib><creatorcontrib>Singh, Maheep</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Agarwal, Ayushi</au><au>Deshmukh, Maroti</au><au>Singh, Maheep</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Object detection framework to generate secret shares</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2020-09-01</date><risdate>2020</risdate><volume>79</volume><issue>33-34</issue><spage>24685</spage><epage>24706</epage><pages>24685-24706</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Nowadays, the sharing of images via the Internet has been widely used. The security concern during transmission of images has been a very important issue, as images contain a lot of crucial information. To prevent access to this information by any unauthorized user various encryption schemes have been developed. An image may consist of a large number of pixels and the encryption of the whole image takes more time. To overcome this problem, we proposed an algorithm that focuses on encryption of only those objects which contain the major information of an image instead of encrypting the complete image, this saves the time required in encryption as only the objects contained in the image are encrypted. The proposed algorithm exploits the use of object detection and image secret sharing. Object detection is done using the “You Only Look Once (YOLO)” algorithm. Further, the objects detected are encrypted using (n,n) modular arithmetic secret sharing scheme. The quantitative measures like correlation, SSIM, RMSE, PSNR has been used to evaluate the performance of the proposed algorithm on COCO dataset. The experimental results show that the proposed algorithm is lossless i.e. original and reconstructed images are exactly the same. The proposed algorithm is efficient and can be used in a broad range of applications.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-09169-x</doi><tpages>22</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2020-09, Vol.79 (33-34), p.24685-24706 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2435937571 |
source | ABI/INFORM Collection; Springer Nature |
subjects | Algorithms Computer Communication Networks Computer Science Correlation analysis Data Structures and Information Theory Encryption Image reconstruction Image transmission Multimedia Information Systems Object recognition Special Purpose and Application-Based Systems |
title | Object detection framework to generate secret shares |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T06%3A52%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Object%20detection%20framework%20to%20generate%20secret%20shares&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Agarwal,%20Ayushi&rft.date=2020-09-01&rft.volume=79&rft.issue=33-34&rft.spage=24685&rft.epage=24706&rft.pages=24685-24706&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-09169-x&rft_dat=%3Cproquest_cross%3E2435937571%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-185d5ee0328234a6dede0277662f772fd421068b58b6139920037a5050d1e89f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2435937571&rft_id=info:pmid/&rfr_iscdi=true |