Skip to main content

2018 | OriginalPaper | Buchkapitel

Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment

verfasst von : Suresh Limkar, Rajas N. Bhalerao, Priya D. Shinde, Abhishek B. Raut

Erschienen in: Smart Computing and Informatics

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is the best way for storing and computing data over an internet. Data can be shared in the form of texts, images, audio, and video. Sharing data securely over internet is a key issue. Cloud computing faces serious issues like security, integrity, and confidentiality of data. The most popular existing techniques for achieving data security faced conflicts like generation of large keys, the heavy computation of large keys, and collision attack of malicious users and also it meant for single owner. To overcome the limitations of existing techniques, we proposed a scheme and implemented image encryption and decryption using symmetric key. In the proposed system, we aim to improve security which implement three algorithms namely, visual cryptography (VC), AES (Advanced Encryption Standards), and watermarking. In this paper, the secret image is divided into multiple shares according to the number of users by visual cryptography, later AES is used. For more authentication and copyright protection, watermarking is used. In the obtained result, security is improved and also a key size is decreased which leads to data sharing among multiple authenticated owners securely without any conflict and original image is regenerated by combining all the shares.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat H. Wang, S. Wu, M. Chen and W. Wang, “Security protection between users and the mobile media cloud,” in IEEE Communications Magazine, vol. 52, no. 3, pp. 73–79, March 2014. H. Wang, S. Wu, M. Chen and W. Wang, “Security protection between users and the mobile media cloud,” in IEEE Communications Magazine, vol. 52, no. 3, pp. 73–79, March 2014.
3.
Zurück zum Zitat Mr. Parjanya C. A Mr. Prasanna Kumar M,” Advanced secure multi-owner data sharing for dynamic groups in cloud”, IJARCSSE, ISSN:2277 128X, 2014. Mr. Parjanya C. A Mr. Prasanna Kumar M,” Advanced secure multi-owner data sharing for dynamic groups in cloud”, IJARCSSE, ISSN:2277 128X, 2014.
4.
Zurück zum Zitat Stelvio Cimato, James C. N. Yang, and Chih-Cheng Wu,” Visual Cryptography Based Watermarking”, Springer, pp. 91–109, 2014. Stelvio Cimato, James C. N. Yang, and Chih-Cheng Wu,” Visual Cryptography Based Watermarking”, Springer, pp. 91–109, 2014.
5.
Zurück zum Zitat S. Sridevi Sathya Priya, P. Karthigaikumar 2, and N.M. SivaMangai, “Generation of 128-Bit Blended Key for AES Algorithm”, Springer International Publishing Switzerland, 10.1007/s11277-014-1888-7, 2013. S. Sridevi Sathya Priya, P. Karthigaikumar 2, and N.M. SivaMangai, “Generation of 128-Bit Blended Key for AES Algorithm”, Springer International Publishing Switzerland, 10.​1007/​s11277-014-1888-7, 2013.
6.
Zurück zum Zitat Salim MuhsinWadi, Nasharuddin Zain, “High Definition Image Encryption Algorithm Based on AES Modification”, Springer Science+Business Media, New York, 10.1007/s11277-014-1888-7, 2014. Salim MuhsinWadi, Nasharuddin Zain, “High Definition Image Encryption Algorithm Based on AES Modification”, Springer Science+Business Media, New York, 10.​1007/​s11277-014-1888-7, 2014.
7.
Zurück zum Zitat Li-hua Wu, Wen-juan Jiang and Junkuo Cao, “Research of Image Watermarking Algorithm and Application in Eco-Tourism Digital Museums Copyrights Protection”, Springer International Publishing Switzerland, 10.1007/978-3-319-03449-2_23, 2014. Li-hua Wu, Wen-juan Jiang and Junkuo Cao, “Research of Image Watermarking Algorithm and Application in Eco-Tourism Digital Museums Copyrights Protection”, Springer International Publishing Switzerland, 10.​1007/​978-3-319-03449-2_​23, 2014.
8.
Zurück zum Zitat Guang Yu1 and Xue Jun Zhao, “Study Based on Chaotic Encryption and Digital Watermarking Algorithm”, Springer-Verlag Berlin Heidelberg, pp. 619–625, 2012. Guang Yu1 and Xue Jun Zhao, “Study Based on Chaotic Encryption and Digital Watermarking Algorithm”, Springer-Verlag Berlin Heidelberg, pp. 619–625, 2012.
9.
Zurück zum Zitat Kai-Hui Lee and Pei-Ling Chiu, “Digital Image Sharing by Diverse Image Media”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1, January 2014. Kai-Hui Lee and Pei-Ling Chiu, “Digital Image Sharing by Diverse Image Media”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1, January 2014.
10.
Zurück zum Zitat S. K. Saroj, S. K. Chauhan, A. K. Sharma and S. Vats, “Threshold Cryptography Based Data Security in Cloud Computing,” Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, Ghaziabad, 2015, pp. 202–207. S. K. Saroj, S. K. Chauhan, A. K. Sharma and S. Vats, “Threshold Cryptography Based Data Security in Cloud Computing,” Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, Ghaziabad, 2015, pp. 202–207.
Metadaten
Titel
Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment
verfasst von
Suresh Limkar
Rajas N. Bhalerao
Priya D. Shinde
Abhishek B. Raut
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5547-8_61

Neuer Inhalt