Skip to main content
Top

2018 | OriginalPaper | Chapter

Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment

Authors : Suresh Limkar, Rajas N. Bhalerao, Priya D. Shinde, Abhishek B. Raut

Published in: Smart Computing and Informatics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is the best way for storing and computing data over an internet. Data can be shared in the form of texts, images, audio, and video. Sharing data securely over internet is a key issue. Cloud computing faces serious issues like security, integrity, and confidentiality of data. The most popular existing techniques for achieving data security faced conflicts like generation of large keys, the heavy computation of large keys, and collision attack of malicious users and also it meant for single owner. To overcome the limitations of existing techniques, we proposed a scheme and implemented image encryption and decryption using symmetric key. In the proposed system, we aim to improve security which implement three algorithms namely, visual cryptography (VC), AES (Advanced Encryption Standards), and watermarking. In this paper, the secret image is divided into multiple shares according to the number of users by visual cryptography, later AES is used. For more authentication and copyright protection, watermarking is used. In the obtained result, security is improved and also a key size is decreased which leads to data sharing among multiple authenticated owners securely without any conflict and original image is regenerated by combining all the shares.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference H. Wang, S. Wu, M. Chen and W. Wang, “Security protection between users and the mobile media cloud,” in IEEE Communications Magazine, vol. 52, no. 3, pp. 73–79, March 2014. H. Wang, S. Wu, M. Chen and W. Wang, “Security protection between users and the mobile media cloud,” in IEEE Communications Magazine, vol. 52, no. 3, pp. 73–79, March 2014.
3.
go back to reference Mr. Parjanya C. A Mr. Prasanna Kumar M,” Advanced secure multi-owner data sharing for dynamic groups in cloud”, IJARCSSE, ISSN:2277 128X, 2014. Mr. Parjanya C. A Mr. Prasanna Kumar M,” Advanced secure multi-owner data sharing for dynamic groups in cloud”, IJARCSSE, ISSN:2277 128X, 2014.
4.
go back to reference Stelvio Cimato, James C. N. Yang, and Chih-Cheng Wu,” Visual Cryptography Based Watermarking”, Springer, pp. 91–109, 2014. Stelvio Cimato, James C. N. Yang, and Chih-Cheng Wu,” Visual Cryptography Based Watermarking”, Springer, pp. 91–109, 2014.
5.
go back to reference S. Sridevi Sathya Priya, P. Karthigaikumar 2, and N.M. SivaMangai, “Generation of 128-Bit Blended Key for AES Algorithm”, Springer International Publishing Switzerland, 10.1007/s11277-014-1888-7, 2013. S. Sridevi Sathya Priya, P. Karthigaikumar 2, and N.M. SivaMangai, “Generation of 128-Bit Blended Key for AES Algorithm”, Springer International Publishing Switzerland, 10.​1007/​s11277-014-1888-7, 2013.
6.
go back to reference Salim MuhsinWadi, Nasharuddin Zain, “High Definition Image Encryption Algorithm Based on AES Modification”, Springer Science+Business Media, New York, 10.1007/s11277-014-1888-7, 2014. Salim MuhsinWadi, Nasharuddin Zain, “High Definition Image Encryption Algorithm Based on AES Modification”, Springer Science+Business Media, New York, 10.​1007/​s11277-014-1888-7, 2014.
7.
go back to reference Li-hua Wu, Wen-juan Jiang and Junkuo Cao, “Research of Image Watermarking Algorithm and Application in Eco-Tourism Digital Museums Copyrights Protection”, Springer International Publishing Switzerland, 10.1007/978-3-319-03449-2_23, 2014. Li-hua Wu, Wen-juan Jiang and Junkuo Cao, “Research of Image Watermarking Algorithm and Application in Eco-Tourism Digital Museums Copyrights Protection”, Springer International Publishing Switzerland, 10.​1007/​978-3-319-03449-2_​23, 2014.
8.
go back to reference Guang Yu1 and Xue Jun Zhao, “Study Based on Chaotic Encryption and Digital Watermarking Algorithm”, Springer-Verlag Berlin Heidelberg, pp. 619–625, 2012. Guang Yu1 and Xue Jun Zhao, “Study Based on Chaotic Encryption and Digital Watermarking Algorithm”, Springer-Verlag Berlin Heidelberg, pp. 619–625, 2012.
9.
go back to reference Kai-Hui Lee and Pei-Ling Chiu, “Digital Image Sharing by Diverse Image Media”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1, January 2014. Kai-Hui Lee and Pei-Ling Chiu, “Digital Image Sharing by Diverse Image Media”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1, January 2014.
10.
go back to reference S. K. Saroj, S. K. Chauhan, A. K. Sharma and S. Vats, “Threshold Cryptography Based Data Security in Cloud Computing,” Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, Ghaziabad, 2015, pp. 202–207. S. K. Saroj, S. K. Chauhan, A. K. Sharma and S. Vats, “Threshold Cryptography Based Data Security in Cloud Computing,” Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, Ghaziabad, 2015, pp. 202–207.
Metadata
Title
Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment
Authors
Suresh Limkar
Rajas N. Bhalerao
Priya D. Shinde
Abhishek B. Raut
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5547-8_61