[PDF][PDF] Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm.
Cloud computing utilizes enormous clusters of serviceable and manageable resources that
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …
An efficient framework for anomaly detection in attributed social networks
Anomaly Detection on attributed networks has recently drawn significant attention from
researchers and is widely used in a number of high-impact areas. The majority of current …
researchers and is widely used in a number of high-impact areas. The majority of current …
A pilot study and survey on methods for anomaly detection in online social networks
An anomaly in online social networks is an unusual occurrence that deviates greatly from
the standard. Financial fraud, social spam, and network intrusion can all be prevented with …
the standard. Financial fraud, social spam, and network intrusion can all be prevented with …
High-capacity reversible data hiding in encrypted images using multi-layer embedding
Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity in the
field of signal processing and cloud computing. In this study, we propose a high-capacity …
field of signal processing and cloud computing. In this study, we propose a high-capacity …
Data security management framework for digital twins of industrial pipeline
Digital Twin (DT) is an emerging technology that is a cornerstone of the 4 th industrial
revolution. Over the next decade, it is expected to revolutionise industrial processes via …
revolution. Over the next decade, it is expected to revolutionise industrial processes via …
基于Paillier 的可分离密文域可逆信息隐藏.
林文兵, 张敏情, 郭帅, 孔咏骏 - Application Research of …, 2021 - search.ebscohost.com
为了提高信息嵌入率和实现直接解密后无损恢复原始图像, 提出了基于Paillier
的可分离密文域可逆信息隐藏算法. 首先图像拥有者利用Paillier 算法对图像进行加密后上传云 …
的可分离密文域可逆信息隐藏算法. 首先图像拥有者利用Paillier 算法对图像进行加密后上传云 …
The Realizations of Steganography in Encrypted Domain
Y Ke, M Zhang, J Liu, X Yang - arXiv preprint arXiv:2304.02614, 2023 - arxiv.org
With the popularization and application of privacy protection technologies in cloud service
and social network, ciphertext has been gradually becoming a common platform for public to …
and social network, ciphertext has been gradually becoming a common platform for public to …
A novel lossless data hiding scheme in homomorphically encrypted images
In this paper, we have presented a novel lossless data hiding scheme in a homomorphically
encrypted image. After applying the homomorphic encryption function to the original image …
encrypted image. After applying the homomorphic encryption function to the original image …
Advancements in reversible data hiding in encrypted images using public key cryptography
With the evolving needs of cloud-based information exchange, the challenge of a reliable
and secure communication channel has also been the center of attention recently. Although …
and secure communication channel has also been the center of attention recently. Although …
Privacy-Preserving ID3 Algorithms: A Comparison
NT Madathil, FK Dankar - 2021 IEEE 12th Annual Ubiquitous …, 2021 - ieeexplore.ieee.org
Many real-life scenarios require the analysis of large amounts of data from multiple sources.
Often, the data contain highly sensitive information and may be subject to privacy laws …
Often, the data contain highly sensitive information and may be subject to privacy laws …