Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning
暂无分享,去创建一个
M. Rafsanjani | G. Sharma | Dinesh Goyal | Nikhil Ranjan | Varsha Arya | Sarvesh Kumar | Shivam Tiwari | T. R. Kumar | Surendra Kumar
[1] Dilip Kumar J. Saini,et al. Detection and tracking of moving cloud services from video using saliency map model , 2022, Journal of Discrete Mathematical Sciences and Cryptography.
[2] N. Hemrajani,et al. Data management framework for IoT edge-cloud architecture for resource-constrained IoT application , 2022, Journal of Discrete Mathematical Sciences and Cryptography.
[3] Ashish Tiwari,et al. Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World , 2022, Int. J. Softw. Innov..
[4] Ashish Tiwari,et al. OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System , 2021, Int. J. Web Based Learn. Teach. Technol..
[5] Ankit Kumar Jain,et al. A survey of phishing attack techniques, defence mechanisms and open research challenges , 2021, Enterp. Inf. Syst..
[6] Zhihui Li,et al. Visual saliency guided complex image retrieval , 2020, Pattern Recognit. Lett..
[7] Ashish Tiwari,et al. Realm Towards Service Optimization in Fog Computing , 2019, Int. J. Fog Comput..
[8] Bright Keswani,et al. Video Temporing Detection Assessment in No-Reference Mode using Machine Learning , 2019, International Journal of Research in Advent Technology.
[9] Dinesh Goyal,et al. Video tempering detection assessment in full reference mode using difference matrices , 2019, Journal of Discrete Mathematical Sciences and Cryptography.
[10] Lianbing Deng,et al. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..
[11] Mohammad A. Alsmirat,et al. Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2019, Multimedia Tools and Applications.
[12] Xuan Li,et al. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.
[13] Amit Kumar Tiwari,et al. A C LOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR , 2013 .
[14] Gaurav Bhatnagar,et al. Robust watermarking using fractional wavelet packet transform , 2012 .
[15] Feng Liu,et al. Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners , 2011, IET Inf. Secur..
[16] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[17] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[18] Young-Chang Hou,et al. Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .
[19] Ahmet M. Eskicioglu,et al. Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.
[20] Tieniu Tan,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..
[21] Chinchen Chang,et al. A colour image copyright protection scheme based on visual cryptography and discrete cosine transform , 2002 .
[22] Ashutosh Kumar Singh,et al. Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions , 2022, IEEE Access.
[23] Christian Esposito,et al. Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..
[24] Ashish Tiwari,et al. Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters , 2015 .
[25] Der-Chyuan Lou,et al. A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.