Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System
暂无分享,去创建一个
Chin-Chen Chang | Yongfeng Huang | Linna Zhou | Xin Tang | Chinchen Chang | Yongfeng Huang | Xin Tang | Linna Zhou
[1] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[2] Ioan-Catalin Dragoi,et al. Adaptive Pairing Reversible Watermarking , 2016, IEEE Transactions on Image Processing.
[3] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[4] Balasubramanian Raman,et al. Reversible data hiding based on Shamir's secret sharing for color images over cloud , 2018, Inf. Sci..
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Li Dong,et al. Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[8] Dinu Coltuc,et al. Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.
[9] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[10] Jiankun Hu,et al. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.
[11] Yining Qi,et al. Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data , 2016, IWDW.
[12] Jinjun Chen,et al. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.
[13] Hyoung Joong Kim,et al. Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Gio Wiederhold,et al. Semantics-sensitive integrated matching for picture libraries and biomedical image databases , 2000 .
[15] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[16] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[17] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Hong Jiang,et al. Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.
[19] Fucai Zhou,et al. Identity-Based Public Multi-Replica Provable Data Possession , 2017, IEEE Access.
[20] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[22] Jing Dong,et al. Ensemble Reversible Data Hiding , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).
[23] Gwan-Hwan Hwang,et al. Efficient Real-Time Auditing and Proof of Violation for Cloud Storage Systems , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).
[24] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[25] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[26] Jin Liu,et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.
[27] G. Coatrieux,et al. An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[28] Kyung-Hyune Rhee,et al. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage , 2018, IEEE Access.
[29] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[30] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[31] Nora Cuppens-Boulahia,et al. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.
[32] Yao Zhao,et al. Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[33] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[34] Alptekin Kup,et al. Official Arbitration with Secure Cloud Storage Application , 2013 .