Robust scheme to protect authentication code of message/image documents in cloud computing.
Zaid Ameen AbduljabbarHai JinAli A. YassinZaid Alaa HussienMohammed Abdulridha HussainSalah H. AbbdalDeqing ZouPublished in: ICNC (2016)
Keyphrases
- cloud computing
- image authentication
- computing resources
- data center
- service providers
- distributed computing
- data management
- cloud computing environment
- identity management
- secure manner
- watermarking technique
- source code
- computing technologies
- security analysis
- security issues
- business models
- big data
- authentication scheme
- cost effective
- computing infrastructure
- network access
- cloud storage
- cloud platform
- databases
- cloud computing platform