{"id":"https://openalex.org/W3216656403","doi":"https://doi.org/10.1007/s11042-021-11737-8","title":"POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing","display_name":"POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing","publication_year":2021,"publication_date":"2021-11-19","ids":{"openalex":"https://openalex.org/W3216656403","doi":"https://doi.org/10.1007/s11042-021-11737-8","mag":"3216656403"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-021-11737-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-021-11737-8","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086221261","display_name":"Tianpeng Deng","orcid":"https://orcid.org/0000-0002-3082-2684"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianpeng Deng","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China"],"raw_orcid":"https://orcid.org/0000-0002-3082-2684","affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106943653","display_name":"Xuan Li","orcid":"https://orcid.org/0000-0002-4013-8480"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210120389","display_name":"Fujian Polytechnic of Information Technology","ror":"https://ror.org/02j5qn328","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210120389"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Li","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","Digital Fujian Big Data Security Technology Institute, Fuzhou, 350117, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Digital Fujian Big Data Security Technology Institute, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210120389"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042765290","display_name":"Ying Wu","orcid":"https://orcid.org/0009-0000-6998-8924"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Wu","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, 350117, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086221261"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.3884,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62426279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"81","issue":"3","first_page":"3693","last_page":"3714"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.862812876701355},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6930338740348816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6453589200973511},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6260605454444885},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.595063328742981},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5751839876174927},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47221094369888306},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.4599212408065796},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4575793147087097},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.406647264957428},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1901087462902069}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.862812876701355},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6930338740348816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6453589200973511},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6260605454444885},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.595063328742981},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5751839876174927},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47221094369888306},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.4599212408065796},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4575793147087097},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.406647264957428},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1901087462902069},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-021-11737-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-021-11737-8","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3089220606","display_name":null,"funder_award_id":"61872090","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G804834654","display_name":null,"funder_award_id":"61872086","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W756028442","https://openalex.org/W1648953540","https://openalex.org/W1976122681","https://openalex.org/W2017091664","https://openalex.org/W2026254891","https://openalex.org/W2031614119","https://openalex.org/W2092782098","https://openalex.org/W2132172731","https://openalex.org/W2146916812","https://openalex.org/W2170269447","https://openalex.org/W2336568179","https://openalex.org/W2342152533","https://openalex.org/W2461759357","https://openalex.org/W2469486851","https://openalex.org/W2470727891","https://openalex.org/W2508330072","https://openalex.org/W2514315863","https://openalex.org/W2528608753","https://openalex.org/W2605606249","https://openalex.org/W2791895608","https://openalex.org/W2793696846","https://openalex.org/W2905582731","https://openalex.org/W2947483594","https://openalex.org/W2952080392","https://openalex.org/W2981985696","https://openalex.org/W2987988737","https://openalex.org/W2988466623","https://openalex.org/W2990014978","https://openalex.org/W3027406059","https://openalex.org/W3136319326"],"related_works":["https://openalex.org/W1916685473","https://openalex.org/W2055682261","https://openalex.org/W1993363272","https://openalex.org/W2186390138","https://openalex.org/W2060035984","https://openalex.org/W2790129917","https://openalex.org/W2992856432","https://openalex.org/W2100638064","https://openalex.org/W4388405209","https://openalex.org/W2529287180"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
