{"id":"https://openalex.org/W4312752906","doi":"https://doi.org/10.1109/mmsp55362.2022.9949258","title":"Secure Image Watermarking in Cloud Computing with Distributed Paillier Cryptosystem","display_name":"Secure Image Watermarking in Cloud Computing with Distributed Paillier Cryptosystem","publication_year":2022,"publication_date":"2022-09-26","ids":{"openalex":"https://openalex.org/W4312752906","doi":"https://doi.org/10.1109/mmsp55362.2022.9949258"},"language":"en","primary_location":{"id":"doi:10.1109/mmsp55362.2022.9949258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp55362.2022.9949258","pdf_url":null,"source":{"id":"https://openalex.org/S4363605768","display_name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035829490","display_name":"Zhipeng Zhou","orcid":"https://orcid.org/0000-0001-8540-3412"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhipeng Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443103","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-2863-5441"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Chen","raw_affiliation_strings":["School of Cyber Security, Guangdong Polytechnic Normal University,Guangzhou,China","School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Guangdong Polytechnic Normal University,Guangzhou,China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012895165","display_name":"Chenyu Dong","orcid":"https://orcid.org/0009-0000-7737-7699"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Dong","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069998992","display_name":"Peijia Zheng","orcid":"https://orcid.org/0000-0003-0979-8613"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peijia Zheng","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,GuangDong Province Key Laboratory of Information Security Technology,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"GuangDong Province Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035829490"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15328675,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8583662509918213},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8234109282493591},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7929248809814453},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7430516481399536},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.702573299407959},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.6619783639907837},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6319448351860046},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5831231474876404},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.45797938108444214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.456490695476532},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.43450605869293213},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40078258514404297},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3310815095901489},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20650812983512878},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.17224624752998352},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07909917831420898}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8583662509918213},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8234109282493591},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7929248809814453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7430516481399536},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.702573299407959},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6619783639907837},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6319448351860046},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5831231474876404},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.45797938108444214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.456490695476532},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.43450605869293213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40078258514404297},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3310815095901489},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20650812983512878},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.17224624752998352},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07909917831420898}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mmsp55362.2022.9949258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp55362.2022.9949258","pdf_url":null,"source":{"id":"https://openalex.org/S4363605768","display_name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G780788869","display_name":null,"funder_award_id":"62102101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2038402918","https://openalex.org/W2099633994","https://openalex.org/W2132172731","https://openalex.org/W2142432849","https://openalex.org/W2281202115","https://openalex.org/W2461759357","https://openalex.org/W2611822001","https://openalex.org/W2726198683","https://openalex.org/W2752061190","https://openalex.org/W2754237067","https://openalex.org/W2949073274","https://openalex.org/W3081489129","https://openalex.org/W4226047321","https://openalex.org/W4285247073","https://openalex.org/W6679763910","https://openalex.org/W6740125474","https://openalex.org/W6743621689","https://openalex.org/W6744529318","https://openalex.org/W6770086788"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4401608539","https://openalex.org/W1967073369","https://openalex.org/W4238582915","https://openalex.org/W2281180546","https://openalex.org/W4390887375","https://openalex.org/W1575311728","https://openalex.org/W4402347828","https://openalex.org/W2094069016","https://openalex.org/W2369575317"],"abstract_inverted_index":{"As":[0],"individuals":[1],"and":[2,16,27,30,45,118,131],"companies":[3],"become":[4],"more":[5,15,17,44,46],"aware":[6],"of":[7,24,72,108,121,133],"copyright,":[8],"image":[9,52,111],"watermarking":[10,35,53,135],"technology":[11],"is":[12],"being":[13],"used":[14],"in":[18,76],"reality.":[19],"Due":[20],"to":[21,99],"the":[22,77,85,90,93,101,106,109,116,122,129],"limitation":[23],"local":[25],"storage":[26],"computing":[28,40],"power":[29],"privacy":[31],"protection":[32],"concerns,":[33],"privacy-preserving":[34],"techniques":[36],"based":[37,55],"on":[38,56,74],"cloud":[39,62,82,94],"are":[41],"gradually":[42],"gaining":[43],"attention.":[47],"We":[48,113],"propose":[49],"an":[50],"encrypted":[51,102],"scheme":[54],"discrete":[57],"cosine":[58],"transform":[59],"(DCT)":[60],"under":[61],"computing.":[63],"Using":[64],"homomorphic":[65,78],"encryption":[66,79],"(HE),":[67],"we":[68],"achieve":[69],"secure":[70],"embedding":[71,87,91],"watermarks":[73],"images":[75],"domain.":[80],"The":[81],"server":[83,95],"accomplishes":[84],"watermark":[86],"algorithm.":[88],"During":[89],"process,":[92],"does":[96],"not":[97],"need":[98],"decrypt":[100],"image,":[103],"thus":[104],"ensuring":[105],"security":[107,117],"original":[110],"data.":[112],"theoretically":[114],"analyze":[115],"computational":[119],"complexity":[120],"whole":[123],"scheme.":[124,136],"Our":[125],"experimental":[126],"results":[127],"show":[128],"effectiveness":[130],"reliability":[132],"our":[134]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
