Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System
暂无分享,去创建一个
[1] Suneeta Agarwal,et al. An effective pixel-wise fragile watermarking scheme based on ARA bits , 2011, ICCCS '11.
[2] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[3] Nasir D. Memon,et al. Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.
[4] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[5] Kianoosh Mokhtarian,et al. Authentication schemes for multimedia streams: Quantitative analysis and comparison , 2010, TOMCCAP.
[6] Pradeep K. Atrey,et al. Secure randomized image watermarking based on singular value decomposition , 2013, ACM Trans. Multim. Comput. Commun. Appl..
[7] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[8] Rajat Subhra Chakraborty,et al. A generalized tamper localization approach for reversible watermarking algorithms , 2013, TOMCCAP.
[9] H.R. Sheikh,et al. Blind quality assessment for JPEG2000 compressed images , 2002, Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, 2002..
[10] Pradeep K. Atrey,et al. Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[11] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[12] Pradeep K. Atrey,et al. Secret sharing approach for securing cloud-based pre-classification volume ray-casting , 2015, Multimedia Tools and Applications.
[13] Pradeep K. Atrey,et al. Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] V. P. Binu,et al. Generalized Secret Sharing using Permutation Ordered Binary System , 2014, ArXiv.
[17] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[18] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[19] Mohamed Rida,et al. A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[20] Robert H. Deng,et al. A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications , 2009, TOMCCAP.
[21] Marco Botta,et al. Protecting the Content Integrity of Digital Imagery with Fidelity Preservation: An Improved Version , 2014, TOMCCAP.
[22] P DeepikaM,et al. A Novel Secret Sharing Scheme Using POB Number System and CRT , 2016 .
[23] Chin-Chen Chang,et al. Protecting the content integrity of digital imagery with fidelity preservation , 2011, TOMCCAP.
[24] Suneeta Agarwal,et al. An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.
[25] Alan C. Bovik,et al. Image quality assessment using natural scene statistics , 2004 .
[26] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .