BITS TO COLOR IMAGE CRYPTOGRAPHY FOR SECURE DATA TRANSMISSION IN CLOUD DATABASES

被引:0
|
作者
MadhaviLatha, P. [1 ]
Katamaneni, Madhavi [1 ]
Guttikonda, Geetha [1 ]
机构
[1] VRSiddhartha Engn Coll, Dept IT, Vijayawada, Andhra Pradesh, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
Authentication; digital messages; encryption; digital signature; quantum qu bits; cryptographic techniques; spinning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitized signatures empower the "validation" and non-repudiation of superior messages, guaranteeing the beneficiary of an advanced message for every persona of the sender and the uprightness of the message. As Attribute based total encryption is superior to anything, we have selected ABE for Encryption. To keep away from an outsider, we have actually selected quantum Mechanics for key age and dispersion to improve protection in the cloud. The difficulty is that after cloud professional co-ops deliver administration that time the programmer may hack the username and Password. To prevent this problem we have executed the idea of advanced Signature. Our proposed plan relies upon on generating the photograph from the content that we want to ship thoroughly and turning the content based on the quantum QU bit approach as a base. This implies that, no extra information is delivered to the underlying content material where we will be able to ship the information in a secured manner. This is probably completed by making use of various photograph companies beginning with grayscale images to 24 bits. The maximum crucial favorable function in our proposed cryptographic method is that it would not require an additional image to conceal the content material under it, apart from that it has a reduced size and extremely brief in an exam with unique structures. This is seen in disbursed storage devices with information mining that utilizes avaricious spread tree technique.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [1] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416
  • [2] Secure Transmission of Data by Splitting Image
    Raj, Jitha T.
    Sivadasan, E. T.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 362 - 368
  • [3] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [4] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [5] Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
    Abdelfatah, Roayat Ismail
    IEEE ACCESS, 2020, 8 : 3875 - 3890
  • [6] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Swetha, Gadde
    Janaki, Karur
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (23) : 33971 - 34007
  • [7] Cloud Access Secure with Identity Based Cryptography
    Hamadi, Houria
    Khireddine, Abdelkrim
    Tari, Abdelkamel
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, MSPN 2015, 2015, 9395 : 109 - 118
  • [8] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Gadde Swetha
    Karur Janaki
    Multimedia Tools and Applications, 2022, 81 : 33971 - 34007
  • [9] Secure data transmission with cloud computing in heterogeneous wireless networks
    Chu, Chung-Hua
    Ouyang, Yen-Chieh
    Jang, Chang-Bu
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1325 - 1336
  • [10] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,