A Safe Sharing Authentication Scheme for Marine Images on Cloud

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain f...

متن کامل

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images

Secret image sharing (SIS) technique protects an image by sharing it among many users. Most existing SIS schemes produce meaningless shadow images, which tends to cause attackers’ suspicion. In this paper, a meaningful secret image sharing scheme is proposed that, for the first time, uses mosaic images as the shadow images. The secret image is divided into several parts, and each part is transf...

متن کامل

Towards a DHT Networks and Safe File Sharing Scheme in Cloud Storage Service

Safe file sharing mechanism in cloud storage is one of the most significant elements that affects the development of security technology. With application of homomorphic key agreement mechanism, Shamir secret sharing algorithm, Bloom Filter and B-tree search algorithm and Rsync data updating algorithm, a safe file sharing scheme in cloud storage is established based on cloud storage infrastruct...

متن کامل

A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret Sharing

Cloud computing is an emerging IT service paradigm. Instead of developing their own IT departments, business sectors purchase on-demand IT service from external providers in a per-use basis. From business cost perspective, companies are shifting capital expenses (CapExp) on hardware equipments to operational expenses (OpExp). Many companies, especially those startups, found this cloud IT servic...

متن کامل

A Lightweight Authentication Scheme for Mobile Cloud Computing

The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOP Conference Series: Materials Science and Engineering

سال: 2018

ISSN: 1757-8981,1757-899X

DOI: 10.1088/1757-899x/371/1/012066