Search
Search Results
-
A reversible data embedding approach based on inter-channel gradient shifted MSB predictor in encrypted images for cloud applications
The paper proposes an encrypted image-based reversible data embedding approach using an inter-channel gradient-shifted MSB predictor for the...
-
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs
The Internet of Things (IoT) is a revolutionary technological trend that is resha** the way people interact with the digital world, creating...
-
High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption
The rapid development of image encryption and reversible data hiding technology provides protection of image copyright and privacy. For flexible...
-
Enabling efficient and verifiable secure search on cloud-based encrypted big data
Verifiable symmetric searchable encryption schemes have received a lot of attention as they can guarantee the correctness of query results in case of...
-
Reversible Data Hiding in Encrypted Image Based on MSB Inversion
Reversible Data Hiding in the Encrypted image (RDHEI) is an important research topic. This paper improves Korivi and Manikandan's RDHEI method. For... -
Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
Due to the drawbacks of the many-to-many search model for accessing digital records in institutional settings like offices, hospitals, and government...
-
Encrypted Image Search Based on SGX and Hierarchical Index
Cloud computing meets the storage and computing needs brought about by the explosive growth of images, but it also raises privacy threats. Encryption... -
Lossless Compression Approach for Reversible Data Hiding in Encrypted Images
The popularity of multimedia and internet communication has increased abruptly. It is not only vital to save original media without losing... -
Privacy Preserving Keyword Search Over Hash Encrypted Data in Distributed Environment
In trusted public cloud, allowing data consumers to recover the information with full integrity. The most of research efforts were focused on a... -
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks
Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the...
-
Survey on Secure Encrypted Data with Authorized De-duplication
The need to keep a large amount of data in data centers is becoming a major issue, and research suggests that roughly 60% of the data in storage... -
Only Header: a reliable encrypted traffic classification framework without privacy risk
Encrypted traffic classification plays a critical role in network management, providing appropriate Quality-of-Service and Network Intrusion...
-
Identifying Consumer Drones via Encrypted Traffic
To address the threats of consumer drones, effective drone countermeasures are required. As with such a process, identifying the specific type of... -
Secure shortest distance queries over encrypted graph in cloud computing
Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the...
-
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops...
-
Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree
Data protection shares sensitive data with authorized users over a wireless communication network (WCN). To protect the data, a secured sharing...
-
Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice
To cope with the local storage stress that has resulted from the increase in data volumes and to keep data privacy, users outsource their data to...
-
CG-Transmission: A New Encrypted Transmission Method for the Data Middle Platform
As one of the major hubs of the Industrial Internet of Things, the Data Middle Platform is under immense pressure to preserve the security and... -
An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images
To protect the privacy of medical images, as well as the patient personal information associated with it, this paper proposes a reversible data...
-
Hybrid Malicious Encrypted Network Traffic Flow Detection Model
Encrypted communication technology has evolved as the network, and Internet applications have advanced. Malicious communication, on the other hand,...