[PDF][PDF] Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm.

B Seth, S Dalal, DN Le, V Jaglan, N Dahiya… - … , Materials & Continua, 2021 - academia.edu
Cloud computing utilizes enormous clusters of serviceable and manageable resources that
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …

An efficient framework for anomaly detection in attributed social networks

W Khan, M Haroon - International Journal of Information Technology, 2022 - Springer
Anomaly Detection on attributed networks has recently drawn significant attention from
researchers and is widely used in a number of high-impact areas. The majority of current …

A pilot study and survey on methods for anomaly detection in online social networks

W Khan, M Haroon - Human-Centric Smart Computing: Proceedings of …, 2022 - Springer
An anomaly in online social networks is an unusual occurrence that deviates greatly from
the standard. Financial fraud, social spam, and network intrusion can all be prevented with …

High-capacity reversible data hiding in encrypted images using multi-layer embedding

A Malik, P He, H Wang, AN Khan, S Pirasteh… - IEEE …, 2020 - ieeexplore.ieee.org
Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity in the
field of signal processing and cloud computing. In this study, we propose a high-capacity …

Data security management framework for digital twins of industrial pipeline

I Anda, R Mishra, AM Aliyu - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Digital Twin (DT) is an emerging technology that is a cornerstone of the 4 th industrial
revolution. Over the next decade, it is expected to revolutionise industrial processes via …

基于Paillier 的可分离密文域可逆信息隐藏.

林文兵, 张敏情, 郭帅, 孔咏骏 - Application Research of …, 2021 - search.ebscohost.com
为了提高信息嵌入率和实现直接解密后无损恢复原始图像, 提出了基于Paillier
的可分离密文域可逆信息隐藏算法. 首先图像拥有者利用Paillier 算法对图像进行加密后上传云 …

The Realizations of Steganography in Encrypted Domain

Y Ke, M Zhang, J Liu, X Yang - arXiv preprint arXiv:2304.02614, 2023 - arxiv.org
With the popularization and application of privacy protection technologies in cloud service
and social network, ciphertext has been gradually becoming a common platform for public to …

A novel lossless data hiding scheme in homomorphically encrypted images

A Malik, H Wang, AN Khan, Y Chen, Y Chen - Digital Forensics and …, 2020 - Springer
In this paper, we have presented a novel lossless data hiding scheme in a homomorphically
encrypted image. After applying the homomorphic encryption function to the original image …

Advancements in reversible data hiding in encrypted images using public key cryptography

AN Khan, MY Fan, A Malik… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
With the evolving needs of cloud-based information exchange, the challenge of a reliable
and secure communication channel has also been the center of attention recently. Although …

Privacy-Preserving ID3 Algorithms: A Comparison

NT Madathil, FK Dankar - 2021 IEEE 12th Annual Ubiquitous …, 2021 - ieeexplore.ieee.org
Many real-life scenarios require the analysis of large amounts of data from multiple sources.
Often, the data contain highly sensitive information and may be subject to privacy laws …