Outsourcing chaotic selective image encryption to the cloud with steganography
暂无分享,去创建一个
Tao Xiang | Jia Hu | Jianglin Sun | Tao Xiang | Jia Hu | Jianglin Sun
[1] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[2] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[3] Kazuki Murakami,et al. Improvement of security in cloud systems based on steganography , 2013, 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013).
[4] Chunhe Song,et al. Secure and effective image storage for cloud based e-healthcare systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[5] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[6] Rima Assaf,et al. Efficient neural chaotic generator for image encryption , 2014, Digit. Signal Process..
[7] Bharat K. Bhargava,et al. A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.
[8] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[9] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[10] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.
[11] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[12] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[13] Nan Hu,et al. Secure Image Filtering , 2006, 2006 International Conference on Image Processing.
[14] Omed Khalind,et al. Single-mismatch 2LSB embedding steganography , 2013, IEEE International Symposium on Signal Processing and Information Technology.
[15] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[16] Tao Zhang,et al. Reliable detection of LSB steganography based on the difference image histogram , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[17] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[18] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[19] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[20] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[21] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[22] Min-Shiang Hwang,et al. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..
[23] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[24] Lin Teng,et al. A novel colour image encryption algorithm based on chaos , 2012, Signal Process..
[25] Chin-Chen Chang,et al. A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..
[26] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[27] Laurent Nana,et al. A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement , 2013, 2013 European Modelling Symposium.
[28] X. Liao,et al. Selective image encryption using a spatiotemporal chaotic system. , 2007, Chaos.
[29] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[30] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[31] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[32] Zhihua Xia,et al. Steganalysis of two least significant bits embedding based on least square method , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[33] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[34] G. Manoj Someswar,et al. Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .
[35] Kee-Young Yoo,et al. A New Steganography Scheme Based on an Index-Color Image , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[36] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[37] Xiaohui Yuan,et al. Ensure privacy and security in the process of medical image analysis , 2013, 2013 IEEE International Conference on Granular Computing (GrC).
[38] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[39] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[40] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[41] Muthucumaru Maheswaran,et al. Privacy aware image template matching in clouds using ambient data , 2013, The Journal of Supercomputing.
[42] Kwok-Tung Lo,et al. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..
[43] Hassan Aghaeinia,et al. A More Secure Steganography Method in Spatial Domain , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.