Sign in

Image privacy protection with secure JPEG transmorphing.

Lin YuanTouradj Ebrahimi
Published in: IET Signal Process. (2017)
Keyphrases
  • privacy protection
  • image data
  • input image
  • databases
  • privacy preserving
  • social media
  • data sources
  • data quality
  • data sharing
  • sensitive data
  • personal data
  • trusted third party