Deng et al., 2021 - Google Patents
Achieving Lightweight Privacy‐Preserving Image Sharing and Illegal Distributor Detection in Social IoTDeng et al., 2021
View PDF- Document ID
- 4526444012451047523
- Author
- Deng T
- Li X
- Jin B
- Chen L
- Lin J
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
The applications of social Internet of Things (SIoT) with large numbers of intelligent devices provide a novel way for social behaviors. Intelligent devices share images according to the groups of their specified owners. However, sharing images may cause privacy disclosure …
- 238000001514 detection method 0 title abstract description 13
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rao et al. | A Secured Cloud Architecture for Storing Image Data using Steganography | |
| Ferdush et al. | Chaotic lightweight cryptosystem for image encryption | |
| Ogiela et al. | False and multi-secret steganography in digital images | |
| Li et al. | A novel 1D chaotic system for image encryption, authentication and compression in cloud | |
| El-Shafai et al. | An efficient multimedia compression-encryption scheme using latin squares for securing internet-of-things networks | |
| Kung | A compressive privacy approach to generalized information bottleneck and privacy funnel problems | |
| Madhu et al. | An overview of image security techiques | |
| Kumar et al. | Detection of data leakage in cloud computing environment | |
| Abdullah et al. | Secure data transfer over internet using image steganography | |
| Ajili et al. | Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image | |
| Ren et al. | A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment | |
| Parekh et al. | Multilayer symmetric and asymmetric technique for audiovisual cryptography | |
| Dhingra et al. | Novel multiple video encryption scheme using two-chaotic-map-based two-level permutation and diffusion | |
| Zhang et al. | Hybrid diffusion-based visual image encryption for secure cloud storage | |
| Deng et al. | Achieving Lightweight Privacy‐Preserving Image Sharing and Illegal Distributor Detection in Social IoT | |
| Ye et al. | A secure social multimedia sharing scheme in the TSHWT_SVD domain based on neural network | |
| Deng et al. | POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing | |
| Tanya Bindu et al. | A survey on various crypto-steganography techniques for real-time images | |
| Kumar et al. | An efficient and effective lossless symmetric key cryptography algorithm for an image | |
| Albalawi et al. | A survey on cloud data security using image steganography | |
| Waziri et al. | Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach | |
| Rupa | A novel approach in security using gyration slab with watermarking technique | |
| Blesswin et al. | Original Research Article Secure transmission of grayscale images with triggered error visual sharing | |
| Radke et al. | Review of Image Security Approaches: Concepts, issues, challenges and applications | |
| Bansal et al. | Comprising Survey of Steganography & Cryptography: Evaluations, Techniques and Trends in Future Research |