A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
XOR Reformed Paillier Encryption Method with Secure De-duplication for Image Scaling and Cropping in Reduced Cloud Storage
2019
International Journal of Intelligent Engineering and Systems
The proposed method performs double encryption with de-duplication over the images for better security and also reduces the storage overhead problem using the scaling and cropping operation. ...
In the first level, the modified Paillier encryption technique is used and an XOR encryption takes place in the second phase. ...
The XOR Encryption Method for Image Scaling & Cropping in Reduced Cloud Storage can be extended in multiple ways. ...
doi:10.22266/ijies2019.0831.30
fatcat:vd7f3coa3na5blp47sprtbkube
Dynamic Multi Keyword Scheme over Encrypted Images
www.ijtrd.com National Conference on Emerging Trends in Computing (NCETC-2K17) organized by Department of Computer Applications
unpublished
Paillier cryptosystem-based scheme is used for multiuser settings and it allows cloud datacenters and is used to image scaling and cropping in the encrypted domain. ...
Paillier changes the multi Crypt to Cryptosystem-based image scaling and cropping schemes. ...
[6] The requested image is scaled and cropped in an encrypted manner.
C. Image User The requested image is accessed by image outsourcer and giving authorization to image user. ...
fatcat:w76xncunojdpzekq4q4yphbaim
Space-Efficient Tiling Scheme for Tile-Level Encrypted Domain Scaling and Cropping
2017
NCTET-2K17
unpublished
and need to activity roughly 2:3 seconds more prominent in light of the fact that getting the scaled picture in plaintext. ...
In that paper, we handle it issue by means of proposing 2DCrypt, an altered Paillier cryptosystem-based picture scaling and editing plan for multi-client settings that permits cloud datacenters to reach ...
SYSTEM MODEL In this work, we consider a distributed cloud-based image storage and processing system where a cloud server stores, scales, and crops an encrypted image on behalf of an image outsourcer. ...
doi:10.22161/ijaers/nctet.2017.1
fatcat:3e7nvu2i5rfihkrfsid6uzezrm