SCIENCE CHINA Information Sciences, Volume 64 , Issue 3 : 139105(2021) https://doi.org/10.1007/s11432-018-9901-0

Efficient outsourced extraction of histogram features over encrypted images in cloud

More info
  • ReceivedDec 28, 2018
  • AcceptedMay 24, 2019
  • PublishedFeb 3, 2021


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. U1736120, 61572309, U1636206, 61525203, U1536109) and Natural Science Foundation of Shanghai (Grant No. 19ZR1419000).


[1] Li B, He J H, Huang J W, et al. A survey on image steganography and steganalysis. J Inf Hiding Multimedia Signal Process, 2011, 2: 142--172. Google Scholar

[2] Song X F, Liu F L, Yang C F, et al. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of ACM Workshop on Information Hiding and Multimedia Security, Portland, 2015. 15--23. Google Scholar

[3] Ma Y, Luo X, Li X. IEEE Trans Circuits Syst Video Technol, 2019, 29: 336-350 CrossRef Google Scholar

[4] Holub V, Fridrich J. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE TransInformForensic Secur, 2015, 10: 219-228 CrossRef Google Scholar

[5] Ren Y L, Dong M, Qian Z X, et al. Efficient algorithm for secure outsourcing of modular exponentiation with single server. IEEE Trans Cloud Comput, 2018. doi: 10.1109/TCC.2018.2851245. Google Scholar

[6] Chen X, Susilo W, Li J. Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci, 2015, 562: 112-121 CrossRef Google Scholar

[7] Dong M, Ren Y. Efficient and secure outsourcing of bilinear pairings with single server. Sci China Inf Sci, 2018, 61: 039104 CrossRef Google Scholar

[8] Wang C, Zhang B, Ren K. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud. IEEE Trans Emerg Top Comput, 2013, 1: 166-177 CrossRef Google Scholar

[9] Ren Y L, Zhang X P, Feng G R, et al. How to extract image features based on co-occurrence matrix securely and efficiently in cloud computing. IEEE Trans Cloud Comput, 2017. doi: 10.1109/TCC.2017.2737980. Google Scholar