Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection

被引:52
作者
Kumar, Ashwani [1 ]
机构
[1] Vardhaman Coll Engn, Dept Comp Sci & Engn, Hyderabad, India
关键词
Cloud Computing; Cryptography; Digital Content; Digital Watermarking; Public Key Cryptography; ENCRYPTION;
D O I
10.4018/IJCAC.2019070102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, the use of digital content or digital media is increasing day by day. Therefore, there is a need to protect the digital document from both unauthorized users and authorized users. The digital document should be protected from authorized users who try to redistribute it illegally. Digital watermarking techniques along with cryptography are insufficient to ensure an adequate level of security of digital media. The security of the transferring digital data in the modern world is also a big challenge because there is a high risk of security breaches. In this article, a secure technique of image fusion using hybrid domains (spatial and frequency) for privacy preserving and copyright protection is proposed. The proposed method provides a secure technique for the digital content in cloud environment. Two cloud services are used to develop this work, which eliminates the role of a trusted third party (TTP). First is the design of an infrastructure as a service (IaaS) to store different images with encryption processes to speed up the image fusion process and save storage space. Second, a Platform as a Service (PaaS) is used to enable the digital content to improve computation power and to increase the bandwidth. The prime objective of the proposed scheme is to transfer the digital media between a service provider and customer in a secure way using a hybrid domain along with cloud storage. Imperceptibility and robustness measures are used to calculate the performance of the proposed approach.
引用
收藏
页码:22 / 36
页数:15
相关论文
共 25 条
[1]  
[Anonymous], 2013, INT J COMPUTER SCI I
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Chacko B, 2017, PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), P618
[4]   Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions [J].
Gupta, B. B. ;
Agrawal, Dharma P. ;
Yamaguchi, Shingo ;
Arachchilage, Nalin A. G. ;
Veluru, Suresh .
ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) :513-515
[5]  
Huang R., 2011, J COMPUTERS, V2011
[6]  
Ibtihal M, 2017, INT J CLOUD APPL COM, V7, P27, DOI 10.4018/IJCAC.2017040103
[7]  
Jaina Palak, 2017, 6 INT C SMART COMP C
[8]  
Joseph Abraham Sundar K, 2017, INT C EL EL COMM COM, DOI DOI 10.1109/ICEECCOT.2017.8284646
[9]  
Kumar Ashwani, 2014, WSEAS Transactions on Signal Processing, V10, P212
[10]  
KUMAR A, 2015, INDIAN J SCI TECHNOL, V8, pNI178