We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,438 results
  1. A reversible data embedding approach based on inter-channel gradient shifted MSB predictor in encrypted images for cloud applications

    The paper proposes an encrypted image-based reversible data embedding approach using an inter-channel gradient-shifted MSB predictor for the...

    Article 06 May 2024
  2. A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs

    The Internet of Things (IoT) is a revolutionary technological trend that is resha** the way people interact with the digital world, creating...

    Yao Li, **ngshu Chen, ... Bingyu Chen in Peer-to-Peer Networking and Applications
    Article 04 March 2024
  3. High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption

    The rapid development of image encryption and reversible data hiding technology provides protection of image copyright and privacy. For flexible...

    Cheng-Hsing Yang, Chi-Yao Weng, Jian-Yu Chen in Soft Computing
    Article 20 January 2022
  4. Enabling efficient and verifiable secure search on cloud-based encrypted big data

    Verifiable symmetric searchable encryption schemes have received a lot of attention as they can guarantee the correctness of query results in case of...

    Ruizhong Du, Chenghao Yu, Mingyue Li in Peer-to-Peer Networking and Applications
    Article 28 August 2023
  5. Reversible Data Hiding in Encrypted Image Based on MSB Inversion

    Reversible Data Hiding in the Encrypted image (RDHEI) is an important research topic. This paper improves Korivi and Manikandan's RDHEI method. For...
    Conference paper 2023
  6. Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing

    Due to the drawbacks of the many-to-many search model for accessing digital records in institutional settings like offices, hospitals, and government...

    Garima Verma, Soumen Kanrar in Wireless Personal Communications
    Article 01 January 2024
  7. Encrypted Image Search Based on SGX and Hierarchical Index

    Cloud computing meets the storage and computing needs brought about by the explosive growth of images, but it also raises privacy threats. Encryption...
    Conference paper 2024
  8. Lossless Compression Approach for Reversible Data Hiding in Encrypted Images

    The popularity of multimedia and internet communication has increased abruptly. It is not only vital to save original media without losing...
    Sangeeta Gautam, Ruchi Agarwal, Manoj Kumar in Proceedings on International Conference on Data Analytics and Computing
    Conference paper 2023
  9. Privacy Preserving Keyword Search Over Hash Encrypted Data in Distributed Environment

    In trusted public cloud, allowing data consumers to recover the information with full integrity. The most of research efforts were focused on a...
    K. S. Sampada, N. P. Kavya in Information Systems for Intelligent Systems
    Conference paper 2023
  10. FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks

    Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the...

    Aparna Singh, Geetanjali Rathee in Annals of Telecommunications
    Article 18 April 2024
  11. Survey on Secure Encrypted Data with Authorized De-duplication

    The need to keep a large amount of data in data centers is becoming a major issue, and research suggests that roughly 60% of the data in storage...
    Conference paper 2023
  12. Only Header: a reliable encrypted traffic classification framework without privacy risk

    Encrypted traffic classification plays a critical role in network management, providing appropriate Quality-of-Service and Network Intrusion...

    Susu Cui, Jian Liu, ... Dan Du in Soft Computing
    Article 03 October 2022
  13. Identifying Consumer Drones via Encrypted Traffic

    To address the threats of consumer drones, effective drone countermeasures are required. As with such a process, identifying the specific type of...
    Conference paper 2024
  14. Secure shortest distance queries over encrypted graph in cloud computing

    Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the...

    **g**g Guo, Jiacong Sun in Wireless Networks
    Article 29 February 2024
  15. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud

    Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops...

    Niharika Singh, Jitendra Kumar, ... Anand Mohan in Journal of Ambient Intelligence and Humanized Computing
    Article 23 May 2022
  16. Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

    Data protection shares sensitive data with authorized users over a wireless communication network (WCN). To protect the data, a secured sharing...

    Ding Chen, Abeer Aljohani in Mobile Networks and Applications
    Article 11 June 2024
  17. Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice

    To cope with the local storage stress that has resulted from the increase in data volumes and to keep data privacy, users outsource their data to...

    **aoling Yu, Chungen Xu, ... Lin Mei in Soft Computing
    Article 12 September 2022
  18. CG-Transmission: A New Encrypted Transmission Method for the Data Middle Platform

    As one of the major hubs of the Industrial Internet of Things, the Data Middle Platform is under immense pressure to preserve the security and...
    Chuqiao Chen, S. B. Goyal, A. Z. M. Ibrahim in Proceedings of Fourth Doctoral Symposium on Computational Intelligence
    Conference paper 2023
  19. An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images

    To protect the privacy of medical images, as well as the patient personal information associated with it, this paper proposes a reversible data...

    David Mata-Mendoza, Diana Nuñez-Ramirez, ... Mariko Nakano-Miyatake in Health and Technology
    Article 21 May 2021
  20. Hybrid Malicious Encrypted Network Traffic Flow Detection Model

    Encrypted communication technology has evolved as the network, and Internet applications have advanced. Malicious communication, on the other hand,...
    Shivaraj Hublikar, N. Shekar V. Shet in Computer Networks and Inventive Communication Technologies
    Conference paper 2023
Did you find what you were looking for? Share feedback.