[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

A survey of reversible data hiding in encrypted images–the first 12 years

P Puteaux, SY Ong, KS Wong, W Puech - Journal of Visual Communication …, 2021 - Elsevier
In the last few years, with the increasing popularity of cloud computing and the availability of
mobile smart devices as well as ubiquitous network connections, more and more users are …

Adaptive payload distribution in multiple images steganography based on image texture features

X Liao, J Yin, M Chen, Z Qin - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the coming era of cloud technology, cloud storage is an emerging technology to store
massive digital images, which provides steganography a new fashion to embed secret …

When an attacker meets a cipher-image in 2018: A year in review

C Li, Y Zhang, EY Xie - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …

Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group

S Xiang, X Luo - IEEE transactions on circuits and systems for …, 2017 - ieeexplore.ieee.org
This paper proposes a novel reversible data hiding scheme for encrypted images by using
homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method …

Two-stage copy-move forgery detection with self deep matching and proposal superglue

Y Liu, C Xia, X Zhu, S Xu - IEEE Transactions on Image …, 2021 - ieeexplore.ieee.org
Copy-move forgery detection identifies a tampered image by detecting pasted and source
regions in the same image. In this paper, we propose a novel two-stage framework specially …

New framework of reversible data hiding in encrypted JPEG bitstreams

Z Qian, H Xu, X Luo, X Zhang - IEEE Transactions on Circuits …, 2018 - ieeexplore.ieee.org
This paper proposes a novel framework of reversible data hiding in encrypted JPEG
bitstream. We first provide a JPEG encryption algorithm to encipher a JPEG image to a …

A high capacity multi-level approach for reversible data hiding in encrypted images

H Ge, Y Chen, Z Qian, J Wang - IEEE Transactions on Circuits …, 2018 - ieeexplore.ieee.org
This paper proposes a novel method of reversible data hiding in encrypted images (RDH-
EI). We first provide an RDH-EI approach using single-level embedding, in which three …

Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression

Z Yin, Y Peng, Y Xiang - IEEE Transactions on Dependable …, 2020 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) receives growing attention because it
protects the content of the original image while the embedded data can be accurately …

Secret sharing based reversible data hiding in encrypted images with multiple data-hiders

B Chen, W Lu, J Huang, J Weng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The existing models of reversible data hiding in encrypted images (RDH-EI) are based on
single data-hider, where the original image cannot be reconstructed when the data-hider is …