Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment

[1]  Mark Campbell,et al.  Beyond Zero Trust: Trust Is a Vulnerability , 2020, Computer.

[2]  Saiful Islam,et al.  Feature Evaluation for Learning Underlying Data-Processing to Enhance Cloud Trust Through Rich Models , 2020 .

[3]  Ning Sun,et al.  Steganalysis by Recombining Spatial Rich Model , 2019, IOP Conference Series: Materials Science and Engineering.

[4]  Paul Jacob,et al.  Access Control Policy Enforcement for Zero-Trust-Networking , 2018, 2018 29th Irish Signals and Systems Conference (ISSC).

[5]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[6]  Tiberio Uricchio,et al.  Tracing images back to their social network of origin: A CNN-based approach , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[7]  Larry S. Davis,et al.  Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[8]  Roberto Caldelli,et al.  Image Origin Classification Based on Social Network Provenance , 2017, IEEE Transactions on Information Forensics and Security.

[9]  Davide Cozzolino,et al.  Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.

[10]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Shuai Ding,et al.  Trust-Enhanced Cloud Service Selection Model Based on QoS Analysis , 2015, PloS one.

[12]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[13]  Tim Storer,et al.  Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.

[14]  Alexander Shraer,et al.  Verifying cloud services: present and future , 2013, OPSR.

[15]  Ali Dehghantanha,et al.  Cloud Forensics Issues and Opportunities , 2013 .

[16]  Alan T. Sherman,et al.  Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..

[17]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[19]  George Candea,et al.  The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.

[20]  Guojun Lu,et al.  An Improved Curvature Scale-Space Corner Detector and a Robust Corner Matching Approach for Transformed Image Identification , 2008, IEEE Transactions on Image Processing.

[21]  James C. King,et al.  A new approach to program testing , 1974, Programming Methodology.

[22]  Jason Garbis,et al.  What Is Zero Trust? , 2021, Zero Trust Security.

[23]  Saiful Islam,et al.  Learning Rich Features from Software-as-a-Service Cloud Computing for Detecting Trust Violations , 2020, Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India.

[24]  Huijuan Wang,et al.  Survey on Zero-Trust Network Security , 2020 .

[25]  M. R. Warsi,et al.  Trust Management Issues in Cloud Computing Ecosystems , 2019, Social Science Research Network.

[26]  Sreejith Keeriyattil,et al.  Microsegmentation and Zero Trust: Introduction , 2019, Zero Trust Networks with VMware NSX.

[27]  Tuva Selstad Dybedokken Trust Management in Fog Computing , 2017 .

[28]  Elizabeth Chang,et al.  TRUST-EVALUATION METRIC FOR CLOUD APPLICATIONS , 2011 .