Lightweight Selective Encryption for Social Data Protection Based on EBCOT Coding
暂无分享,去创建一个
Meikang Qiu | Han Qiu | Zhong Ming | Meiqin Liu | Meiqin Liu | Meikang Qiu | Zhong Ming | Han Qiu
[1] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[2] Ahmad Almogren,et al. An efficient approach of improving privacy and security in online social networks , 2018, Concurr. Comput. Pract. Exp..
[3] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[4] Thomas Stütz,et al. Format-compliant jpeg2000 encryption with combined packet header and packet body protection , 2007, MM&Sec.
[5] Meikang Qiu,et al. Enabling real-time information service on telehealth system over cloud-based big data platform , 2017, J. Syst. Archit..
[6] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[7] Petr Holub,et al. GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000 , 2010, MEMICS.
[8] Touradj Ebrahimi,et al. The JPEG 2000 still image compression standard , 2001, IEEE Signal Process. Mag..
[9] Keith W. Ross,et al. Estimating age privacy leakage in online social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[10] Meikang Qiu,et al. Feedback Dynamic Algorithms for Preemptable Job Scheduling in Cloud Systems , 2010 .
[11] Robert H. Deng,et al. Compliant encryption of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[12] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[13] Paul Voigt,et al. The Eu General Data Protection Regulation (Gdpr): A Practical Guide , 2017 .
[14] François-Xavier Standaert,et al. Mutual Information Analysis: How, When and Why? , 2009, CHES.
[15] Fang Liu,et al. Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce , 2015, CODASPY.
[16] Keke Gai,et al. Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.
[17] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[18] Alptekin Temizel,et al. Optimized GPU Implementation of JPEG 2000 for Satellite Image Decompression , 2018, 2018 IEEE International Conference on Computational Science and Engineering (CSE).
[19] Mohammed Ghanbari,et al. Scope of validity of PSNR in image/video quality assessment , 2008 .
[20] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[21] Jun Zhang,et al. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection , 2015, IEEE Transactions on Computational Social Systems.
[22] Jens H. Krüger,et al. GPGPU: general purpose computation on graphics hardware , 2004, SIGGRAPH '04.
[23] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[24] Ping-Sing Tsai,et al. JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures , 2004 .
[25] Claudio Soriente,et al. Securing Cloud Data Under Key Exposure , 2019, IEEE Transactions on Cloud Computing.
[26] Christophe De Vleeschouwer,et al. Secure and Low Cost Selective Encryption for JPEG2000 , 2008, 2008 Tenth IEEE International Symposium on Multimedia.
[27] Laurence T. Yang,et al. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..
[28] Jon M. Kleinberg,et al. Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook , 2013, CSCW.
[29] Muhammad Al-Qurishi,et al. A prediction system of Sybil attack in social network using deep-regression model , 2017, Future Gener. Comput. Syst..
[30] Mianxiong Dong,et al. FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[31] Kwok-Tung Lo,et al. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..
[32] Andreas Uhl,et al. Selective encryption of wavelet-packet encoded image data: efficiency and security , 2003, Multimedia Systems.
[33] Zhihui Lu,et al. All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives , 2019, Inf. Sci..
[34] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[35] Tao Xiang,et al. Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks , 2014, Signal Process. Image Commun..
[36] Laurence T. Yang,et al. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.
[37] Meikang Qiu,et al. A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.
[38] Zafar Shahid,et al. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.
[39] Naixue Xiong,et al. Construction Low Complexity and Low Delay CDS for Big Data Code Dissemination , 2018, Complex..
[40] Jeffrey S. Vetter,et al. A Survey of Methods for Analyzing and Improving GPU Energy Efficiency , 2014, ACM Comput. Surv..
[41] Thomas Stütz,et al. On Format-Compliant Iterative Encryption of JPEG2000 , 2006, Eighth IEEE International Symposium on Multimedia (ISM'06).