2022
DOI: 10.1109/tsc.2020.3008957
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Lastly, the most relevant works in comparison with our work are [7], [26], [39], [44]. In [39], Xia et al introduced the watermarking technique to a privacy-preserving contentbased image retrieval scheme in cloud computing, which can prevent the user from illegally distributing the retrieved images.…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…Lastly, the most relevant works in comparison with our work are [7], [26], [39], [44]. In [39], Xia et al introduced the watermarking technique to a privacy-preserving contentbased image retrieval scheme in cloud computing, which can prevent the user from illegally distributing the retrieved images.…”
Section: Related Workmentioning
confidence: 96%
“…Unfortunately, Problem 3 was not addressed. Dong et al designed a plaintext image cloud sharing protocol [44], in which the owner's copyright and the user's right are protected together by combining the restrained Paillier cryptosystem and the spread spectrum watermarking scheme. For this protocol, although the illegal distribution of cloud can be traced by embedding the cloud's watermark in plaintext images, Problem 1 is not solved because the image content is completely exposed to the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…A study conducted by [20] analyzes relevant laws, regulations, and policies in Sudan, identifying gaps and the need for a robust legal framework that addresses data sovereignty and security concerns while enabling cloud technology adoption. The results highlight the lack of a comprehensive legal and regulatory framework for cloud computing in Sudan, which can hinder adoption and raise concerns about data protection and security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…During the past few years, some pioneering research has been proposed in this field. The advancement of a combination between watermarking and cryptography is fostered [22][23][24][25][26][27]. For information hiding, Bianchi et al [28] have investigated how to implement the discrete Fourier transform in the encrypted domain.…”
Section: Introductionmentioning
confidence: 99%