SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[2] Suneeta Agarwal,et al. A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.
[3] Pradeep K. Atrey,et al. Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[4] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[5] Balasubramanian Raman,et al. Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system , 2016, ICVGIP '16.
[6] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[7] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[9] Jianting Guo,et al. Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..
[10] Uwe Schwiegelshohn,et al. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..
[11] Manoj Misra,et al. Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system , 2017, Multimedia Tools and Applications.
[12] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[13] Pradeep K. Atrey,et al. Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..
[14] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[15] Mauro Barni,et al. Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..
[16] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[17] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[18] Balasubramanian Raman,et al. Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[19] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[20] Balasubramanian Raman,et al. Reversible data hiding based on Shamir's secret sharing for color images over cloud , 2018, Inf. Sci..