{"id":"https://openalex.org/W3171254097","doi":"https://doi.org/10.1155/2021/5519558","title":"Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT","display_name":"Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT","publication_year":2021,"publication_date":"2021-06-05","ids":{"openalex":"https://openalex.org/W3171254097","doi":"https://doi.org/10.1155/2021/5519558","mag":"3171254097"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5519558","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5519558","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5519558.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5519558.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086221261","display_name":"Tianpeng Deng","orcid":"https://orcid.org/0000-0002-3082-2684"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianpeng Deng","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106943653","display_name":"Xuan Li","orcid":"https://orcid.org/0000-0002-4013-8480"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuan Li","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou 350117, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018642252","display_name":"Biao Jin","orcid":"https://orcid.org/0000-0003-3401-1691"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Jin","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114208250","display_name":"Lei Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I39815113","display_name":"Georgia Southern University","ror":"https://ror.org/04agmb972","country_code":"US","type":"education","lineage":["https://openalex.org/I39815113"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["College of Engineering and Computing, Georgia Southern University, Statesboro, GA 30458, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computing, Georgia Southern University, Statesboro, GA 30458, USA","institution_ids":["https://openalex.org/I39815113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070371129","display_name":"Jie Lin","orcid":"https://orcid.org/0000-0003-3476-110X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Lin","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5106943653"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3884,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60247213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8465417623519897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6486172080039978},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6475934386253357},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6437466740608215},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5507010221481323},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5453145503997803},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5389761328697205},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5325891971588135},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49282124638557434},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.44124525785446167},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36509186029434204},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3347867429256439},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3265513777732849},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32467687129974365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8465417623519897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6486172080039978},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6475934386253357},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6437466740608215},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5507010221481323},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5453145503997803},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5389761328697205},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5325891971588135},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49282124638557434},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.44124525785446167},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36509186029434204},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3347867429256439},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3265513777732849},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32467687129974365},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5519558","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5519558","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5519558.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:341eb64a943b43d7877bc042d31a66fc","is_oa":true,"landing_page_url":"https://doaj.org/article/341eb64a943b43d7877bc042d31a66fc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5519558","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5519558","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5519558.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1491720838","display_name":null,"funder_award_id":"61872088","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3055326577","display_name":null,"funder_award_id":"61872086","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G3089220606","display_name":null,"funder_award_id":"61872090","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3314425597","display_name":null,"funder_award_id":"61872088","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G454414450","display_name":null,"funder_award_id":"2019BDKFJJ004","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G644160167","display_name":null,"funder_award_id":"61872090","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G672303765","display_name":null,"funder_award_id":"2019J01276","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6835238593","display_name":null,"funder_award_id":"2019J01276","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G7847868933","display_name":null,"funder_award_id":"2019BDKFJJ004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G804834654","display_name":null,"funder_award_id":"61872086","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3171254097.pdf","grobid_xml":"https://content.openalex.org/works/W3171254097.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1671780007","https://openalex.org/W1967630133","https://openalex.org/W2003668524","https://openalex.org/W2056515392","https://openalex.org/W2094729371","https://openalex.org/W2110753472","https://openalex.org/W2170269447","https://openalex.org/W2336568179","https://openalex.org/W2460569027","https://openalex.org/W2469486851","https://openalex.org/W2470727891","https://openalex.org/W2514315863","https://openalex.org/W2553731080","https://openalex.org/W2791895608","https://openalex.org/W2793556343","https://openalex.org/W2889049822","https://openalex.org/W2889537680","https://openalex.org/W2907663262","https://openalex.org/W2910618689","https://openalex.org/W2911258655","https://openalex.org/W2914770479","https://openalex.org/W2940691483","https://openalex.org/W2952080392","https://openalex.org/W2972112224","https://openalex.org/W2972270478","https://openalex.org/W2979811255","https://openalex.org/W2981222105","https://openalex.org/W2981587265","https://openalex.org/W2988466623","https://openalex.org/W2989102622","https://openalex.org/W2992059036","https://openalex.org/W2998340298","https://openalex.org/W3005206852","https://openalex.org/W3011154433","https://openalex.org/W3034614954","https://openalex.org/W3037885237","https://openalex.org/W3040062233","https://openalex.org/W3044806259","https://openalex.org/W3093114702","https://openalex.org/W3098424710","https://openalex.org/W3128861226","https://openalex.org/W3142542690"],"related_works":["https://openalex.org/W1967073369","https://openalex.org/W2281180546","https://openalex.org/W2350486768","https://openalex.org/W1680673927","https://openalex.org/W3036561648","https://openalex.org/W4281696921","https://openalex.org/W2736079351","https://openalex.org/W3130643437","https://openalex.org/W2384158193","https://openalex.org/W2164344703"],"abstract_inverted_index":{"The":[0,104,182],"applications":[1],"of":[2,5,11,29,88,126,128,152,159,170],"social":[3,19],"Internet":[4],"Things":[6],"(SIoT)":[7],"with":[8,56,71],"large":[9],"numbers":[10],"intelligent":[12],"devices":[13,22],"provide":[14,139],"a":[15,63,155],"novel":[16],"way":[17],"for":[18,147],"behaviors.":[20],"Intelligent":[21],"share":[23],"images":[24,35,42,197],"according":[25],"to":[26,138,191],"the":[27,41,78,89,113,129,149,157,160,167,171,200],"groups":[28],"their":[30],"specified":[31],"owners.":[32],"However,":[33],"sharing":[34,59,68,102],"may":[36],"cause":[37],"privacy":[38],"disclosure":[39],"when":[40],"are":[43,121],"illegally":[44],"distributed":[45],"without":[46],"owners\u2019":[47],"permission.":[48],"To":[49],"tackle":[50],"this":[51],"issue,":[52],"combining":[53],"blind":[54],"watermark":[55,168],"additive":[57,100],"secret":[58,101],"technique,":[60],"we":[61,133,175],"propose":[62],"lightweight":[64],"and":[65,99,112,142,179,189,198],"privacy-preserving":[66],"image":[67,92,140],"(LPIS)":[69],"scheme":[70],"illegal":[72,161,193],"distributor":[73,162],"detection":[74],"in":[75,85],"SIoT.":[76],"Specifically,":[77],"query":[79],"user\u2019s":[80],"authentication":[81,143],"information":[82,144,202],"is":[83,187],"embedded":[84,201],"two":[86,135],"shares":[87],"transformed":[90,130],"encrypted":[91],"by":[93,123,166],"using":[94],"discrete":[95],"cosine":[96],"transform":[97],"(DCT)":[98],"technique.":[103],"robustness":[105],"against":[106],"attacks,":[107,120],"such":[108],"as":[109],"JPEG":[110],"attack":[111],"least":[114],"significant":[115],"bit":[116],"planes":[117],"(LSBs)":[118],"replacement":[119],"improved":[122],"modifying":[124,196],"1/8":[125],"coefficients":[127],"image.":[131,173],"Moreover,":[132],"adopt":[134],"edge":[136],"servers":[137],"storage":[141],"embedding":[145],"services":[146],"reducing":[148],"operational":[150],"burden":[151],"clients.":[153],"As":[154],"result,":[156],"identity":[158],"can":[163],"be":[164],"confirmed":[165],"extraction":[169],"suspicious":[172],"Finally,":[174],"conduct":[176],"security":[177],"analysis":[178],"ample":[180],"experiments.":[181],"results":[183],"show":[184],"that":[185],"LPIS":[186],"secure":[188],"robust":[190],"prevent":[192],"distributors":[194],"from":[195],"manipulating":[199],"before":[203],"unlawful":[204],"sharing.":[205]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
