{"id":"https://openalex.org/W1996720481","doi":"https://doi.org/10.1109/mcom.2014.6766088","title":"Security protection between users and the mobile media cloud","display_name":"Security protection between users and the mobile media cloud","publication_year":2014,"publication_date":"2014-03-01","ids":{"openalex":"https://openalex.org/W1996720481","doi":"https://doi.org/10.1109/mcom.2014.6766088","mag":"1996720481"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.2014.6766088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2014.6766088","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100419573","display_name":"Honggang Wang","orcid":"https://orcid.org/0000-0001-9475-2630"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Honggang Wang","raw_affiliation_strings":["University of Massachusetts","University of Massachusetts, Amherst, MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts","institution_ids":[]},{"raw_affiliation_string":"University of Massachusetts, Amherst, MA, USA#TAB#","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100743605","display_name":"Shaoen Wu","orcid":"https://orcid.org/0000-0002-4768-6930"},"institutions":[{"id":"https://openalex.org/I198089087","display_name":"Ball State University","ror":"https://ror.org/00k6tx165","country_code":"US","type":"education","lineage":["https://openalex.org/I198089087"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shaoen Wu","raw_affiliation_strings":["Ball State University","Ball State University, Muncie, IN USA"],"affiliations":[{"raw_affiliation_string":"Ball State University","institution_ids":["https://openalex.org/I198089087"]},{"raw_affiliation_string":"Ball State University, Muncie, IN USA","institution_ids":["https://openalex.org/I198089087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337209","display_name":"Min Chen","orcid":"https://orcid.org/0000-0002-0960-4447"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Chen","raw_affiliation_strings":["Huazhong University of Science and Technology","Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113520485","display_name":"Wei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I177156846","display_name":"South Dakota State University","ror":"https://ror.org/015jmes13","country_code":"US","type":"education","lineage":["https://openalex.org/I177156846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["South Dakota State University","South Dakota State University; Brookings SD USA"],"affiliations":[{"raw_affiliation_string":"South Dakota State University","institution_ids":["https://openalex.org/I177156846"]},{"raw_affiliation_string":"South Dakota State University; Brookings SD USA","institution_ids":["https://openalex.org/I177156846"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100419573"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":10.9744,"has_fulltext":false,"cited_by_count":81,"citation_normalized_percentile":{"value":0.98851842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"52","issue":"3","first_page":"73","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8810858726501465},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7484084963798523},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6872912645339966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5796513557434082},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.540675163269043},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5023269653320312},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4558829069137573},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43518996238708496},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4277641177177429},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.40733709931373596},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.38727930188179016},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36547064781188965},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18642622232437134},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07001182436943054}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8810858726501465},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7484084963798523},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6872912645339966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5796513557434082},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.540675163269043},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5023269653320312},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4558829069137573},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43518996238708496},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4277641177177429},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.40733709931373596},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.38727930188179016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36547064781188965},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18642622232437134},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07001182436943054}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.2014.6766088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2014.6766088","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1906578180","https://openalex.org/W1990511264","https://openalex.org/W2031546751","https://openalex.org/W2081713029","https://openalex.org/W2121828611","https://openalex.org/W2121942750","https://openalex.org/W2126131277","https://openalex.org/W2132696179","https://openalex.org/W2138783174","https://openalex.org/W2147642870","https://openalex.org/W2149002430","https://openalex.org/W2158125204","https://openalex.org/W2158518777","https://openalex.org/W2162318392","https://openalex.org/W2164587393","https://openalex.org/W6683607212"],"related_works":["https://openalex.org/W2070735207","https://openalex.org/W2034905385","https://openalex.org/W4281385823","https://openalex.org/W3150868077","https://openalex.org/W4251064165","https://openalex.org/W2189508715","https://openalex.org/W3194052956","https://openalex.org/W2282963174","https://openalex.org/W4312728238","https://openalex.org/W2589365628"],"abstract_inverted_index":{"Mobile":[0],"devices":[1,101],"such":[2,19,93,152],"as":[3,20,94,153],"smartphones":[4],"are":[5,75],"widely":[6],"deployed":[7],"in":[8,160,177],"the":[9,28,46,61,66,79,86,128,138,142,157,178,200,209,224,252],"world,":[10],"and":[11,22,37,85,99,120,170,223,244,267],"many":[12],"people":[13],"use":[14,166],"them":[15],"to":[16,24,45,77,105,112,132,165,173,187,192,198,233],"download/upload":[17],"media":[18,39,47,62,67,87,107,139,179,225,265],"video":[21,95],"pictures":[23],"remote":[25],"servers.":[26],"On":[27],"other":[29],"hand,":[30],"a":[31,53,114,230,239],"mobile":[32,58,83,100,221],"device":[33],"has":[34],"limited":[35,103],"resources,":[36],"some":[38],"processing":[40],"tasks":[41],"must":[42],"be":[43,215],"migrated":[44],"cloud":[48,68],"for":[49,127,135,217],"further":[50],"processing.":[51],"However,":[52,89],"significant":[54],"question":[55],"is,":[56],"can":[57,146,214,263],"users":[59,84,136,186,222],"trust":[60],"services":[63],"provided":[64],"by":[65],"service":[69],"providers?":[70],"Many":[71],"traditional":[72,129],"security":[73,116,130,134,150,259],"approaches":[74],"proposed":[76,210,253],"secure":[78,168,182],"data":[80,176,190],"exchange":[81],"between":[82,219],"cloud.":[88,140,180,206,226],"first,":[90],"because":[91],"multimedia":[92,235],"is":[96,110],"large-sized":[97],"data,":[98,108],"have":[102],"capability":[104],"process":[106],"it":[109,125,196],"important":[111],"design":[113,241],"lightweight":[115],"method;":[117],"second,":[118],"uploading":[119],"downloading":[121],"multi-resolution":[122],"images/videos":[123],"make":[124],"difficult":[126],"methods":[131],"ensure":[133],"of":[137,149,242],"Third,":[141],"error-prone":[143],"wireless":[144],"environment":[145],"cause":[147],"failure":[148],"protection":[151],"authentication.":[154],"To":[155],"address":[156],"above":[158],"challenges,":[159],"this":[161],"article,":[162],"we":[163,228],"propose":[164],"both":[167],"sharing":[169,183],"watermarking":[171,212,243],"schemes":[172],"protect":[174],"user's":[175],"The":[181],"scheme":[184],"allows":[185],"upload":[188],"multiple":[189],"pieces":[191],"different":[193],"clouds,":[194],"making":[195],"impossible":[197],"derive":[199],"whole":[201],"information":[202],"from":[203],"any":[204],"one":[205],"In":[207],"addition,":[208],"scalable":[211],"algorithm":[213],"used":[216],"authentications":[218],"personal":[220],"Furthermore,":[227],"introduce":[229],"new":[231],"solution":[232],"resist":[234],"transmission":[236,269],"errors":[237],"through":[238],"joint":[240],"Reed-":[245],"Solomon":[246],"codes.":[247],"Our":[248],"studies":[249],"show":[250],"that":[251],"approach":[254],"not":[255],"only":[256],"achieves":[257],"good":[258],"performance,":[260],"but":[261],"also":[262],"enhance":[264],"quality":[266],"reduce":[268],"overhead.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":15},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
