Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning

Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.

[1]  Dilip Kumar J. Saini,et al.  Detection and tracking of moving cloud services from video using saliency map model , 2022, Journal of Discrete Mathematical Sciences and Cryptography.

[2]  N. Hemrajani,et al.  Data management framework for IoT edge-cloud architecture for resource-constrained IoT application , 2022, Journal of Discrete Mathematical Sciences and Cryptography.

[3]  Ashish Tiwari,et al.  Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World , 2022, Int. J. Softw. Innov..

[4]  Ashish Tiwari,et al.  OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System , 2021, Int. J. Web Based Learn. Teach. Technol..

[5]  Ankit Kumar Jain,et al.  A survey of phishing attack techniques, defence mechanisms and open research challenges , 2021, Enterp. Inf. Syst..

[6]  Zhihui Li,et al.  Visual saliency guided complex image retrieval , 2020, Pattern Recognit. Lett..

[7]  Ashish Tiwari,et al.  Realm Towards Service Optimization in Fog Computing , 2019, Int. J. Fog Comput..

[8]  Bright Keswani,et al.  Video Temporing Detection Assessment in No-Reference Mode using Machine Learning , 2019, International Journal of Research in Advent Technology.

[9]  Dinesh Goyal,et al.  Video tempering detection assessment in full reference mode using difference matrices , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[10]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[11]  Mohammad A. Alsmirat,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2019, Multimedia Tools and Applications.

[12]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[13]  Amit Kumar Tiwari,et al.  A C LOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR , 2013 .

[14]  Gaurav Bhatnagar,et al.  Robust watermarking using fractional wavelet packet transform , 2012 .

[15]  Feng Liu,et al.  Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners , 2011, IET Inf. Secur..

[16]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[17]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[18]  Young-Chang Hou,et al.  Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .

[19]  Ahmet M. Eskicioglu,et al.  Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.

[20]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[21]  Chinchen Chang,et al.  A colour image copyright protection scheme based on visual cryptography and discrete cosine transform , 2002 .

[22]  Ashutosh Kumar Singh,et al.  Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions , 2022, IEEE Access.

[23]  Christian Esposito,et al.  Blockchain-based authentication and authorization for smart city applications , 2021, Inf. Process. Manag..

[24]  Ashish Tiwari,et al.  Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters , 2015 .

[25]  Der-Chyuan Lou,et al.  A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.