Skip to main content
  • Conference proceedings
  • © 2018

Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11066)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ICAIS: International Conference on Artificial Intelligence and Security

Conference proceedings info: ICCCS 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (61 papers)

  1. Front Matter

    Pages I-XVII
  2. Encryption

    1. Front Matter

      Pages 1-1
    2. Threshold Proxy Re-encryption and Its Application in Blockchain

      • Xi Chen, Yun Liu, Yong Li, Changlu Lin
      Pages 16-25
    3. Trace Representation of the Sequences Derived from Polynomial Quotient

      • Liping Zhao, Xiaoni Du, Chenhuang Wu
      Pages 26-37
    4. Unified Quantum No-Go Theorems of Pure States

      • Hui-Ran Li, Ming-Xing Luo, Hong Lai
      Pages 38-47
    5. VideoChain: Trusted Video Surveillance Based on Blockchain for Campus

      • Mingda Liu, Jing Shang, Peng Liu, Yijuan Shi, Mian Wang
      Pages 48-58
  3. Information Hiding

    1. Front Matter

      Pages 59-59
    2. A Blind Quantization Watermarking Scheme for Screen Content Image

      • Jun Wang, Wenbo Wan, Mingsheng Zhang, Liming Zou, Jiande Sun
      Pages 61-71
    3. A Comprehensive Analysis of Interval Based Network Flow Watermarking

      • Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu et al.
      Pages 72-84
    4. A Covert Communication Model Based on IPv6 Multicast

      • Yazhou Kong, Liancheng Zhang, Zhenxing Wang, Yi Guo, Wen Guo
      Pages 85-98
    5. A Data Hiding Scheme with High Quality for H.264/AVC Video Streams

      • Yi Chen, Hongxia Wang, Hanzhou Wu, Yanli Chen, Yong Liu
      Pages 99-110
    6. A Domain Name Model of Anonymous Network Hidden Service

      • Yitong Meng, Jinlong Fei, Yan Chen, Yuefei Zhu
      Pages 111-122
    7. A Layered Steganography Model Based on User Interactions

      • Gao Quansheng, Wang Kaixi
      Pages 123-134
    8. A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents

      • Niandong Liao, Caixia Sun, Lingyun Xiang, Feng Li
      Pages 147-159
    9. A Novel Framework of Robust Video Watermarking Based on Statistical Model

      • Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang
      Pages 160-172
    10. A Novel Nonlocal Low Rank Technique for Fabric Defect Detection

      • Jielin Jiang, Yan Cui, Yadang Chen, Guangwei Gao
      Pages 173-182
    11. A Novel Steganography Scheme Based on Asymmetric Embedding Model

      • Xianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su
      Pages 183-194
    12. A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA

      • Shiqin Liu, Minjun Zhao, Jixin Ma, Jiangyuan Yao, Yucong Duan, Xiaoyi Zhou
      Pages 195-207

About this book

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Editors and Affiliations

  • Nanjing University of Information Science and Technology, Nanjing, China

    Xingming Sun, Zhaoqing Pan

  • Department of Computer Science, Purdue University, West Lafayette, USA

    Elisa Bertino

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access