A novel NMF-based authentication scheme for encrypted speech in cloud computing
暂无分享,去创建一个
Xiaojie Li | Hongxia Wang | Canghong Shi | Yi Hu | Hongxia Wang | Xiaojie Li | Canghong Shi | Yi Hu
[1] Rajesh Kumar,et al. Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.
[2] Zhen Li,et al. Blind and robust audio watermarking scheme based on SVD-DCT , 2011, Signal Process..
[3] C.-C. Jay Kuo,et al. Current Developments and Future Trends in Audio Authentication , 2012, IEEE MultiMedia.
[4] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[5] Ahmed Ghoneim,et al. Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.
[6] Jong Hyuk Park,et al. A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions , 2019, The Journal of Supercomputing.
[7] Xiaomin Wang,et al. A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service , 2018, IEEE Access.
[8] Oscal T.-C. Chen,et al. Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[9] Hongxia Wang,et al. Speech Authentication and Recovery Scheme in Encrypted Domain , 2016, IWDW.
[10] Brij B. Gupta,et al. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment , 2019, Soft Computing.
[11] Eklas Hossain,et al. Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.
[12] Shijun Xiang,et al. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Lei Liu,et al. Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.
[14] Atif Alamri,et al. Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.
[15] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[16] Yiliang Han,et al. Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..
[17] Lianbing Deng,et al. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..
[18] Brij B. Gupta,et al. A novel ECC-based lightweight authentication protocol for internet of things devices , 2019 .
[19] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[20] Hongxia Wang,et al. REPAIR: fragile watermarking for encrypted speech authentication with recovery ability , 2020, Telecommunication Systems.
[21] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[22] Jie Wang,et al. Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .
[23] Jiwu Huang,et al. Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..
[24] Yun-Qing Shi,et al. Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[25] Joonsang Baek,et al. A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption , 2018, Int. J. High Perform. Comput. Netw..
[26] Anand Nayyar,et al. Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based , 2020, IEEE Access.
[27] Pei-Pei Liu,et al. A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform , 2013, Int. J. Comput. Math..
[28] Mahmoud Al-Ayyoub,et al. Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.
[29] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[30] Xingming Sun,et al. Speech authentication and content recovery scheme for security communication and storage , 2017, Telecommunication Systems.
[31] Ruohan Meng. A fusion steganographic algorithm based on Faster R-CNN , 2018 .
[32] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[33] Charu Gandhi,et al. Ensure Hierarchal Identity Based Data Security in Cloud Environment , 2019, Int. J. Cloud Appl. Comput..
[34] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[35] Anand Nayyar,et al. Leveraging energy‐efficient load balancing algorithms in fog computing , 2020, Concurr. Comput. Pract. Exp..
[36] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..