[1] Xia W, Jiang H, Feng D, et al. A comprehensive study of the past, present, and future of data deduplication [J]. Proceedings of the IEEE, 2016, 104(9): 1681-1710. [2] Akarsha D P, Chaudhari S, Apama R. Coarse-to-fine secure image deduplication with Merkle-Hash and image features for cloud storage [C]//2021 Asian Conference on Innovation in Technology (ASIANCON), 2021: 1-6. [3] Agarwala A, Singh P, Atrey P K. Client side secure image deduplication using DICE protocol [C]//2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 2018: 412-417. [4] Digitalvolcano Software Limited. Duplicate cleaner [EB/OL]. [2023-12-23]. https://www.duplicatecleaner.com/. [5] Pattabhi R N, Krishna M C. De-duplication of photograph images using histogram refinement [C]//2011 IEEE Recent Advances in Intelligent Computational Systems, 2011: 391-395. [6] Vestergaard R, Zhang Q, Lucani D E. Generalized deduplication: bounds, convergence, and asymptotic properties [C]//2019 IEEE Global Communications Conference (GLOBECOM), 2019: 1-6. [7] Tang X, Liu Z, Shao Y, et al. Side channel attack resistant cross-user generalized deduplication for cloud storage [C]//ICC 2022-IEEE International Conference on Communications, 2022: 998- 1003. [8] Douceur J R, Adya A, Bolosky W J, et al. Reclaiming space from duplicate files in a serverless distributed file system [C]//Proceedings 22nd International Conference on Distributed Computing Systems, 2002: 617-624. [9] Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication [C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2013: 296-312. [10] Liu J, Asokan N, Pinkas B. Secure deduplication of encrypted data without additional independent servers [C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015: 874-885. [11] 唐鑫, 周琳娜, 单伟杰, 等. 基于阈值重加密的抗边信道攻击云数据安全去重方法[J]. 通信学报, 2020, 41(6): 98-111. Tang X, Zhou L N, Shan W J, et al. Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack [J]. Journal on Communications, 2020, 41(6): 98-111. (in Chinese) [12] Zuo P F, Hua Y, Wang C, et al. Mitigating traffic-based side channel attacks in bandwidthefficient cloud storage [C]//2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2018: 1153-1162. [13] Tang X, Zhang Y, Zhou L N, et al. Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack [J]. Chinese Journal of Electronics, 2021, 30(2): 199-209. [14] Tang X, Chen X, Zhou R, et al. Marking based obfuscation strategy to resist side channel attack in cross-user deduplication for cloud storage [C]//2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022: 547-555. [15] Yu C M, Gochhayat S P, Conti M, et al. Privacy aware data deduplication for side channel in cloud storage [J]. IEEE Transactions on Cloud Computing, 2020, 8(2): 597-609. [16] 林耿豪, 周子集, 唐鑫, 等. 采用随机块附加策略的云数据安全去重方法[J]. 西安电子科技大学学报, 2023, 50(5): 212-228. Lin G H, Zhou Z J, Tang X, et al. Random chunks attachment strategy based secure deduplication for cloud data [J]. Journal of Xidian University, 2023, 50(5): 212-228. (in Chinese) [17] Zhang Q, Guo L, Wei X P. Image encryption using DNA addition combining with chaotic maps [J]. Mathematical and Computer Modelling, 2010, 52(11/12): 2028-2035. [18] Gupta T, Sharma A K, Selwal A. A lightweight image cryptography approach via invertible transformation [C]//202315th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2023: 1-6. [19] Alexan W, Elbeltagy M, Aboshousha A. Lightweight image encryption: cellular automata and the Lorenz system [C]//2021 International Conference on Microelectronics (ICM), 2021: 34-39. [20] Li X, Li J, Huang F L. A secure cloud storage system supporting privacy-preserving fuzzy deduplication [J]. Soft Computing, 2016, 20(4): 1437-1448. [21] Takeshita J, Karl R, Jung T. Secure single-server nearly-identical image deduplication [C]//2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020: 1-6. [22] Jiang T, Yuan X, Chen Y, et al. FuzzyDedup: secure fuzzy deduplication for cloud storage [J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2466-2483. [23] Liu X M, Tang X, Jin L C, et al. Secure cross-user fuzzy deduplication for images in cloud storage [C]//International Conference on Data Mining and Big Data. Springer, 2022: 291-302. [24] Thanoon B N. Using wavelet transform, DPCM and adaptive run-length coding to compress images [C]//6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM’07), 2007: 305-309. [25] Daubechies I, Sweldens W. Factoring wavelet transforms into lifting steps [J]. Journal of Fourier Analysis and Applications, 1998, 4(3): 247-269. |