C-y: Chaotic yolo for user intended image encryption and sharing in social media
dc.contributor.author | Asgari-Chenaghlu, Meysam | |
dc.contributor.author | Feizi-Derakhshi, Mohammad-Reza | |
dc.contributor.author | Nikzad-Khasmakhi, Narjes | |
dc.contributor.author | Feizi-Derakhshi, Ali-Reza | |
dc.contributor.author | Ramezani, Majid | |
dc.contributor.author | Jahanbakhsh-Nagadeh, Zoleikha | |
dc.contributor.author | Balafar, Mohammad-Ali | |
dc.contributor.author | Rahkar-Farshi, Taymaz | |
dc.date.accessioned | 2021-05-15T11:33:20Z | |
dc.date.available | 2021-05-15T11:33:20Z | |
dc.date.issued | 2021 | |
dc.department | Mühendislik ve Doğa Bilimleri Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.description | Rahkar-Farshi, Taymaz/0000-0003-4070-1058; Derakhshi, Mohammad Reza Feizi/0000-0002-8548-976X; Derakhshi, Ali Reza Feizi/0000-0003-3036-1651; Balafar, M.A/0000-0001-5898-0871; Nikzad, Narjes/0000-0003-3536-1343 | |
dc.description.abstract | Social media is an inseparable part of our daily life where we post and share photos and media related to our life and in some cases we intend to share them between specific people. This intended and cherry picked sharing of media needs a better solution rather than simply picking users. Some social media platforms do not restrict other users from sharing timeline posts of others; meaning, one can simply forward a post from another person to a third one and no data preservation has been applied. In most cases we do not intend to secure the whole media and only important parts of it are intended to be secured. In this work we propose a novel method based on YoloV3 object detection and chaotic image encryption to overcome the issue of user intended data preservation in social media platforms. Our proposed method is capable of both automatic image encryption on full or user selected regions. Statistical and cryptographic analysis show superiority of our method compared to other state-of-the-art methods while it keeps the speed as high as possible for online and realtime use cases. (C) 2020 Elsevier Inc. All rights reserved. | en_US |
dc.description.sponsorship | University of Tabriz [S/806] | en_US |
dc.description.sponsorship | This project is supported by a research grant of the University of Tabriz (Number S/806). | en_US |
dc.identifier.doi | 10.1016/j.ins.2020.07.007 | |
dc.identifier.endpage | 227 | en_US |
dc.identifier.issn | 0020-0255 | |
dc.identifier.issn | 1872-6291 | |
dc.identifier.scopus | 2-s2.0-85088385948 | |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 212 | en_US |
dc.identifier.uri | https://doi.org/10.1016/j.ins.2020.07.007 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12939/133 | |
dc.identifier.volume | 542 | en_US |
dc.identifier.wos | WOS:000574827600012 | |
dc.identifier.wosquality | N/A | |
dc.indekslendigikaynak | Web of Science | |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Rahkar-Farshi, Taymaz | |
dc.language.iso | en | |
dc.publisher | Elsevier Science Inc | en_US |
dc.relation.ispartof | Information Sciences | |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Deep Learning | en_US |
dc.subject | Chaotic Maps | en_US |
dc.subject | Image Encryption | en_US |
dc.subject | Data Preservation | en_US |
dc.subject | Social Media | en_US |
dc.title | C-y: Chaotic yolo for user intended image encryption and sharing in social media | |
dc.type | Article |