A security model to protect the isolation of medical data in the cloud using hybrid cryptography

S Gadde, J Amutharaj, S Usha - Journal of Information Security and …, 2023 - Elsevier
A cloud computing platform delivers a cost-efficient path for cloud users to store and access
data privately over remote storage via an Internet connection. Medical data is stored in the …

Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach

R Anushiadevi, R Amirtharajan - Multimedia Tools and Applications, 2023 - Springer
In this modern era, a large amount of multimedia content plays an important role in various
fields. For multimedia content, storage space and processing speed are more crucial. As a …

基于同态加的压缩感知加密域信息隐藏算法

李名, 信鑫 - 计算机工程与科学, 2024 - joces.nudt.edu.cn
信息隐藏可为云和物联网环境中的海量数据提供必要的安全保护, 传统的加密技术虽然有效保护
了图像的隐私, 但是无法同时提供版权, 完整性等方面的保护, 因此, 在加密域进行信息隐藏面临 …

A data hiding scheme based on single pixel modification with modulus operation

S Wang, T Li, Z Liu, D Pan… - Journal of Intelligent & …, 2022 - content.iospress.com
The embedding capacity and steganography quality are two important performance
indicators of data hiding which has practical application value for copyright and intellectual …

[PDF][PDF] Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology

Z Li - International Journal of Network Security, 2024 - ijns.jalaxy.com.tw
Image distortion and poor transmission security are the key problems restricting the
reversible image information hiding technique. The existing image enhancement algorithms …

To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC)

R Hooda, V Poply - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
The excessive demand for digitized images across all fields has made it necessary to
safeguard the images from attackers for secure network transfer. Due to their sensitivity …

Information hiding algorithm in compressive sensing encrypted domain based on homomorphism addition

M LI, XIN Xin - Computer Engineering & Science, 2024 - joces.nudt.edu.cn
Information hiding ensures necessary security of massive data in the cloud and Internet of
things environments. Although traditional encryption can protect the privacy of the image …

Soft computing and intelligent systems:: Techniques and applications

SM Thampi, ESM El-Alfy, L Trajkovic - Journal of Intelligent & Fuzzy …, 2021 - dl.acm.org
Soft computing and intelligent systems: : Techniques and applications: Journal of Intelligent
& Fuzzy Systems: Applications in Engineering and Technology: Vol 41, No 5 skip to main …