[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
A survey of reversible data hiding in encrypted images–the first 12 years
In the last few years, with the increasing popularity of cloud computing and the availability of
mobile smart devices as well as ubiquitous network connections, more and more users are …
mobile smart devices as well as ubiquitous network connections, more and more users are …
Adaptive payload distribution in multiple images steganography based on image texture features
With the coming era of cloud technology, cloud storage is an emerging technology to store
massive digital images, which provides steganography a new fashion to embed secret …
massive digital images, which provides steganography a new fashion to embed secret …
When an attacker meets a cipher-image in 2018: A year in review
C Li, Y Zhang, EY Xie - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …
Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group
S Xiang, X Luo - IEEE transactions on circuits and systems for …, 2017 - ieeexplore.ieee.org
This paper proposes a novel reversible data hiding scheme for encrypted images by using
homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method …
homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method …
Two-stage copy-move forgery detection with self deep matching and proposal superglue
Copy-move forgery detection identifies a tampered image by detecting pasted and source
regions in the same image. In this paper, we propose a novel two-stage framework specially …
regions in the same image. In this paper, we propose a novel two-stage framework specially …
New framework of reversible data hiding in encrypted JPEG bitstreams
This paper proposes a novel framework of reversible data hiding in encrypted JPEG
bitstream. We first provide a JPEG encryption algorithm to encipher a JPEG image to a …
bitstream. We first provide a JPEG encryption algorithm to encipher a JPEG image to a …
A high capacity multi-level approach for reversible data hiding in encrypted images
H Ge, Y Chen, Z Qian, J Wang - IEEE Transactions on Circuits …, 2018 - ieeexplore.ieee.org
This paper proposes a novel method of reversible data hiding in encrypted images (RDH-
EI). We first provide an RDH-EI approach using single-level embedding, in which three …
EI). We first provide an RDH-EI approach using single-level embedding, in which three …
Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression
Z Yin, Y Peng, Y Xiang - IEEE Transactions on Dependable …, 2020 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) receives growing attention because it
protects the content of the original image while the embedded data can be accurately …
protects the content of the original image while the embedded data can be accurately …
Secret sharing based reversible data hiding in encrypted images with multiple data-hiders
The existing models of reversible data hiding in encrypted images (RDH-EI) are based on
single data-hider, where the original image cannot be reconstructed when the data-hider is …
single data-hider, where the original image cannot be reconstructed when the data-hider is …