An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
暂无分享,去创建一个
R. Sivakumar | S. Sakthivel | P. Prabu | T. Senthilnathan | S. Sakthivel | T. Senthilnathan | R. Sivakumar | P. Prabu
[1] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[2] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[3] Ambika Pawar,et al. Review of Security and Privacy Techniques in Cloud Computing Environment , 2016 .
[4] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[5] Tung-Shou Chen,et al. A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification , 2010, Signal Process..
[6] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[7] Weiming Zhang,et al. Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.
[8] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[9] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[10] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[11] P. Devaki,et al. A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image , 2014, 2014 Fifth International Conference on Signal and Image Processing.
[12] Nikhila Nyapathy,et al. Reversible Data Hiding In Encrypted Images Using AES Data Encryption Technique , 2014 .
[13] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[14] Yao Zhao,et al. Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[15] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[17] Weiming Zhang,et al. Protecting patient confidential information based on ECG reversible data hiding , 2015, Multimedia Tools and Applications.
[18] Shabnam Sharma,et al. COMPARATIVE ANALYSIS OF VARIOUS AUTHENTICATION TECHNIQUES IN CLOUD COMPUTING , 2013 .
[19] Chin-Chen Chang,et al. Reversible data-embedding scheme using differences between original and predicted pixel values , 2008, IET Inf. Secur..
[20] Zheng Xu,et al. Secure outsourcing of modular exponentiations in cloud and cluster computing , 2016, Cluster Computing.
[21] Weiming Zhang,et al. Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding , 2015, IEEE Transactions on Information Forensics and Security.
[22] Jeho Nam,et al. Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[23] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[24] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.