A security model to protect the isolation of medical data in the cloud using hybrid cryptography
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …
data privately over remote storage via an Internet connection. Medical data is stored in the …
Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach
R Anushiadevi, R Amirtharajan - Multimedia Tools and Applications, 2023 - Springer
In this modern era, a large amount of multimedia content plays an important role in various
fields. For multimedia content, storage space and processing speed are more crucial. As a …
fields. For multimedia content, storage space and processing speed are more crucial. As a …
基于同态加的压缩感知加密域信息隐藏算法
李名, 信鑫 - 计算机工程与科学, 2024 - joces.nudt.edu.cn
信息隐藏可为云和物联网环境中的海量数据提供必要的安全保护, 传统的加密技术虽然有效保护
了图像的隐私, 但是无法同时提供版权, 完整性等方面的保护, 因此, 在加密域进行信息隐藏面临 …
了图像的隐私, 但是无法同时提供版权, 完整性等方面的保护, 因此, 在加密域进行信息隐藏面临 …
A data hiding scheme based on single pixel modification with modulus operation
S Wang, T Li, Z Liu, D Pan… - Journal of Intelligent & …, 2022 - content.iospress.com
The embedding capacity and steganography quality are two important performance
indicators of data hiding which has practical application value for copyright and intellectual …
indicators of data hiding which has practical application value for copyright and intellectual …
[PDF][PDF] Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology
Z Li - International Journal of Network Security, 2024 - ijns.jalaxy.com.tw
Image distortion and poor transmission security are the key problems restricting the
reversible image information hiding technique. The existing image enhancement algorithms …
reversible image information hiding technique. The existing image enhancement algorithms …
To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC)
R Hooda, V Poply - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
The excessive demand for digitized images across all fields has made it necessary to
safeguard the images from attackers for secure network transfer. Due to their sensitivity …
safeguard the images from attackers for secure network transfer. Due to their sensitivity …
Information hiding algorithm in compressive sensing encrypted domain based on homomorphism addition
M LI, XIN Xin - Computer Engineering & Science, 2024 - joces.nudt.edu.cn
Information hiding ensures necessary security of massive data in the cloud and Internet of
things environments. Although traditional encryption can protect the privacy of the image …
things environments. Although traditional encryption can protect the privacy of the image …
Soft computing and intelligent systems:: Techniques and applications
Soft computing and intelligent systems: : Techniques and applications: Journal of Intelligent
& Fuzzy Systems: Applications in Engineering and Technology: Vol 41, No 5 skip to main …
& Fuzzy Systems: Applications in Engineering and Technology: Vol 41, No 5 skip to main …