BITS TO COLOR IMAGE CRYPTOGRAPHY FOR SECURE DATA TRANSMISSION IN CLOUD DATABASES

被引:0
|
作者
MadhaviLatha, P. [1 ]
Katamaneni, Madhavi [1 ]
Guttikonda, Geetha [1 ]
机构
[1] VRSiddhartha Engn Coll, Dept IT, Vijayawada, Andhra Pradesh, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
Authentication; digital messages; encryption; digital signature; quantum qu bits; cryptographic techniques; spinning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitized signatures empower the "validation" and non-repudiation of superior messages, guaranteeing the beneficiary of an advanced message for every persona of the sender and the uprightness of the message. As Attribute based total encryption is superior to anything, we have selected ABE for Encryption. To keep away from an outsider, we have actually selected quantum Mechanics for key age and dispersion to improve protection in the cloud. The difficulty is that after cloud professional co-ops deliver administration that time the programmer may hack the username and Password. To prevent this problem we have executed the idea of advanced Signature. Our proposed plan relies upon on generating the photograph from the content that we want to ship thoroughly and turning the content based on the quantum QU bit approach as a base. This implies that, no extra information is delivered to the underlying content material where we will be able to ship the information in a secured manner. This is probably completed by making use of various photograph companies beginning with grayscale images to 24 bits. The maximum crucial favorable function in our proposed cryptographic method is that it would not require an additional image to conceal the content material under it, apart from that it has a reduced size and extremely brief in an exam with unique structures. This is seen in disbursed storage devices with information mining that utilizes avaricious spread tree technique.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [31] Secure and privacy-preserving data sharing in the cloud based on lossless image coding
    Khelifi, Fouad
    Brahimi, Tahar
    Han, Jungong
    Li, Xuelong
    SIGNAL PROCESSING, 2018, 148 : 91 - 101
  • [32] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [33] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
    Atiewi, Saleh
    Al-Rahayfeh, Amer
    Almiani, Muder
    Yussof, Salman
    Alfandi, Omar
    Abugabah, Ahed
    Jararweh, Yaser
    IEEE ACCESS, 2020, 8 : 113498 - 113511
  • [34] Secure Inter Cloud Data Migration
    Khalil, Issa
    Hababeh, Ismail
    Khreishah, Abdallah
    2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2016, : 62 - 67
  • [35] Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud
    Reddy, N. Madhusudhana
    Ramesh, G.
    Kasturi, Srinivasa Babu
    Sharmila, D.
    Gopichand, G.
    Robinson, L. Thomas
    APPLIED NANOSCIENCE, 2022, 13 (3) : 2449 - 2461
  • [36] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [37] SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud
    Ahmadian, Mohammad
    Plochan, Frank
    Roessler, Zak
    Marinescu, Dan C.
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (02) : 63 - 74
  • [38] A Review on Assured Deletion of Cloud Data Based on Cryptography
    Wang, Guan
    Luo, Yehong
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 580 - 585
  • [39] Secure Medical Image Steganography with RSA Cryptography using Decision Tree
    Jain, Mamta
    Choudhary, Rishabh Charan
    Kumar, Anil
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 291 - 295
  • [40] Secure Data Transfer in Android using Elliptical Curve Cryptography
    Ruprah, Taranpreet Singh
    Kore, Vishal S.
    Mali, Yogesh K.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,