A Safe Sharing Authentication Scheme for Marine Images on Cloud
نویسندگان
چکیده
منابع مشابه
A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain f...
متن کاملA Meaningful Scheme for Sharing Secret Images Using Mosaic Images
Secret image sharing (SIS) technique protects an image by sharing it among many users. Most existing SIS schemes produce meaningless shadow images, which tends to cause attackers’ suspicion. In this paper, a meaningful secret image sharing scheme is proposed that, for the first time, uses mosaic images as the shadow images. The secret image is divided into several parts, and each part is transf...
متن کاملTowards a DHT Networks and Safe File Sharing Scheme in Cloud Storage Service
Safe file sharing mechanism in cloud storage is one of the most significant elements that affects the development of security technology. With application of homomorphic key agreement mechanism, Shamir secret sharing algorithm, Bloom Filter and B-tree search algorithm and Rsync data updating algorithm, a safe file sharing scheme in cloud storage is established based on cloud storage infrastruct...
متن کاملA PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret Sharing
Cloud computing is an emerging IT service paradigm. Instead of developing their own IT departments, business sectors purchase on-demand IT service from external providers in a per-use basis. From business cost perspective, companies are shifting capital expenses (CapExp) on hardware equipments to operational expenses (OpExp). Many companies, especially those startups, found this cloud IT servic...
متن کاملA Lightweight Authentication Scheme for Mobile Cloud Computing
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2018
ISSN: 1757-8981,1757-899X
DOI: 10.1088/1757-899x/371/1/012066