Wu et al., 2017 - Google Patents
Secret digital images over cloud computing using meaningful secret sharing techniqueWu et al., 2017
- Document ID
- 15592808634010317884
- Author
- Wu W
- Cheng K
- Yang S
- Publication year
- Publication venue
- 2017 International Conference on Applied System Innovation (ICASI)
External Links
Snippet
Cloud computing offers enormous benefits of shared resources to its users, especially for image space to store up personal digital images/photos. But, it also faces with some problems about security and privacy concerns. In order to enhance image security and …
- 238000000034 method 0 title abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9276745B2 (en) | Preserving image privacy when manipulated by cloud services | |
Wright et al. | Thumbnail-preserving encryption for JPEG | |
Kurihara et al. | An encryption-then-compression system for jpeg standard | |
CN108810555B (en) | Thumbnail image privacy protection method based on image compression and elastic resolution | |
CN115002293B (en) | Privacy confidentiality method, system and storage medium based on thumbnail format reservation | |
Chuman et al. | Image manipulation specifications on social networking services for encryption-then-compression systems | |
Li et al. | Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning | |
SaiChandana et al. | A new visual cryptography scheme for color images | |
Koh et al. | Encrypted cloud photo storage using Google photos | |
Wu et al. | Secret digital images over cloud computing using meaningful secret sharing technique | |
Wu et al. | Enhancing image security and privacy in cloud system using steganography | |
CN115131253B (en) | Secret image sharing method and system for resisting JPEG recompression | |
CN113206926B (en) | Method for balancing privacy and usability of image based on three-pixel-point encryption | |
Miss et al. | A keyless approach for RDH in encrypted images using visual cryptography | |
Hu et al. | Reversible secret image sharing with steganography and dynamic embedding | |
Lotlikar et al. | Image steganography and cryptography using three level password security | |
Thakkar et al. | Video steganography using encrypted payload for satellite communication | |
Kanchana et al. | An enhanced VCS of image encryption using SDS algorithm without secret keys | |
Liu et al. | Hiding media data via shaders: Enabling private sharing in the clouds | |
Ibrahim et al. | Text image secret sharing with hiding based on color feature | |
Ahmad et al. | Perceptual Image Encryption: A Communication Perspective | |
Hossain et al. | Secured transmission of sensitive images of skin diseases using steganography and cryptography | |
KS | File Encryption using Noise Images as Key | |
Vatsa et al. | A Steganographic Method Using a Secure and Effective Pattern-Based Approach | |
Nalawade et al. | ENCRYPTION THEN COMPRESSION BASED SYSTEM USING GRAYSCALE BASED IMAGE ENCRYPTION FOR JPEG IMAGES. |