Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 4376282, 14 pages
https://doi.org/10.1155/2017/4376282
Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

School of Information Science and Technology, University of Science and Technology of China, Anhui, China

Correspondence should be addressed to Weiming Zhang; nc.ude.ctsu@mwgnahz

Received 14 August 2017; Accepted 9 November 2017; Published 11 December 2017

Academic Editor: Kim-Kwang Raymond Choo

Copyright © 2017 Keyang Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Directive, EU,95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data,Official Journal of the EC, 23(6), 1995.
  2. Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free movement of Such Data (General Data Protection Regulation), 2012.
  3. Steinberg, An act to add Chapter 22.1 (commencing with Section 22580) to Division 8 of the Business and Professions Code, relating to the Internet,California senate, 2013.
  4. Google, European privacy requests for search removals, 2017, https://www.google.com/transparencyreport/removals/europeprivacy.
  5. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2594–2608, 2016. View at Publisher · View at Google Scholar
  6. Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903–916, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Geambasu, T. Kohno, A. A. Levy et al., “Vanish: Increasing Data Privacy with Self-Destructing Data,” in Proceedings of the USENIX Security Symposium, pp. 299–316, 2009.
  8. G. Roxana, K. Tadayoshi, A. Amit et al., “Increasing data privacy with self-destructing data,” in Proceedings of the USENIX Security09, pp. 299–316, Berkeley, CA, USA, 2009.
  9. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC '09, pp. 169–178, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Rivest L, L. Adleman, and L. Dertouzos M, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 11, pp. 169–180, 1978. View at Google Scholar
  11. Z. Fu and X. Cao, “An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking,” in Proceedings of the International Conference on Cloud Computing and Security, pp. 468–474, Springer, 2016.
  12. J. Long, D. Zhang, C. Zuo, J. Duan, and W. Huang, “A robust low-overheadwatermarking for field authentication of intellectual property cores,” Computer Science and Information Systems, vol. 13, no. 2, pp. 609–622, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Bianchi and A. Piva, “Secure watermarking for multimedia content protection: a review of its benefits and open issues,” IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 87–96, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Memon and P. W. Wong, “A buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, vol. 10, no. 4, pp. 643–649, 2001. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, “An efficient and anonymous buyer-seller watermarking protocol,” IEEE Transactions on Image Processing, vol. 13, no. 12, pp. 1618–1626, 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. P. Tao and A. M. Eskicioglu, “A robust multiple watermarking scheme in the Discrete Wavelet Transform domain,” in Proceedings of the Internet Multimedia Management Systems V, pp. 133–144, October 2004. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Molina-Garcia, R. Reyes-Reyes, V. Ponomaryov, and C. Cruz-Ramos, “Watermarking algorithm for authentication and self-recovery of tampered images using DWT,” in Proceedings of the 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves, MSMW 2016, pp. 1–4, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. O. Wahballa, A. Abdalla, K. Hamdnaalla, M. Ramadan, and C. Xu, “An efficient and secure certificateless public key watermarking scheme based on 1VD-DWT,” in Proceedings of the 2016 IEEE International Conference on Cloud Computing and Big Data Analysis, ICCCBDA 2016, pp. 183–188, July 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Chen and G. Wornell, “Digital watermarking and information embedding using dither modulation,” in Proceedings of the 1998 IEEE Second Workshop on Multimedia Signal Processing, pp. 273–278, Redondo Beach, CA, USA. View at Publisher · View at Google Scholar
  21. P. Bas and J. Hurri, “Security of DM quantization watermarking schemes: a practical study for digital images,” in Proceedings of the International Workshop on Digital Watermarking, pp. 186–200, Springer, 2005.
  22. B. Matam and D. Lowe, “Watermark-only security attack on DM-QIM watermarking: Vulnerability to guided key guessing,” in Proceedings of the Crime Prevention Technologies and Applications for Advancing Criminal Investigation, pp. 85–106, IGI Global, 2012.
  23. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223–238, 1999.
  24. C.-C. Lu and S.-Y. Tseng, “Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter,” in Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2002, pp. 277–285, July 2002. View at Publisher · View at Google Scholar · View at Scopus
  25. E. Klinger, “pHash The open source perceptual hash library,” 2017, http://www.phash.org/.
  26. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 44, no. 5, pp. 1897–1905, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. S. Pandey, P. Khanna, and H. Yokota, “A semantics and image retrieval system for hierarchical image databases,” Information Processing & Management, vol. 52, no. 4, pp. 571–591, 2016. View at Publisher · View at Google Scholar · View at Scopus