Open Access   Article Go Back

Protection of Data in Cloud Computing using Image Processing - Watermarking Technique

S.Thaiyalnayaki 1 , S.Devi 2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 115-118, Dec-2018

Online published on Dec 31, 2018

Copyright © S.Thaiyalnayaki, S.Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Thaiyalnayaki, S.Devi, “Protection of Data in Cloud Computing using Image Processing - Watermarking Technique,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.115-118, 2018.

MLA Style Citation: S.Thaiyalnayaki, S.Devi "Protection of Data in Cloud Computing using Image Processing - Watermarking Technique." International Journal of Computer Sciences and Engineering 06.11 (2018): 115-118.

APA Style Citation: S.Thaiyalnayaki, S.Devi, (2018). Protection of Data in Cloud Computing using Image Processing - Watermarking Technique. International Journal of Computer Sciences and Engineering, 06(11), 115-118.

BibTex Style Citation:
@article{_2018,
author = {S.Thaiyalnayaki, S.Devi},
title = {Protection of Data in Cloud Computing using Image Processing - Watermarking Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {115-118},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=553},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=553
TI - Protection of Data in Cloud Computing using Image Processing - Watermarking Technique
T2 - International Journal of Computer Sciences and Engineering
AU - S.Thaiyalnayaki, S.Devi
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 115-118
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

With the dawn of easiness in manipulating and transferring digital data in today’s world, insuring digital image integrity has therefore become a major issue. One solution to this problem is to embed watermark in the digital data, i.e. Digital watermarking. Usually watermarking has been used in currency notes, government documents, passport for security features and stamp papers for legal purpose. Watermarking is very beneficial for identifying the document of any authorized person. Digital watermarking emerged as a solution for copyrights detection, protection and maintenance of important data. Millions of private images are generated in various digital devices every day. Cloud computing, one of the most important computing paradigms emerged in recent years. Watermarking techniques to ensure data privacy. Consequently, this framework will increase the speed of development on ready-to-use digital humanities tools.

Key-Words / Index Term

Digital Watermarking, Cloud Computing, various algorithm and various Techniques

References

[1]. A survey on watermarking methods for security of cloud data, Mrs. Anitha P1 , Dr. Malini M Patil2 1.2Department of Information Science and Engineering, JSSATE (India), (ICRISEM-16), 26TH February 2016, www.conferenceworld.in.
[2]. Data Provenance for Cloud Computing using Watermark, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017
[3]. To Propose A Novel Technique for Watermarking In Cloud Computing, © 2015 IJEDR | Volume 3, Issue 2 | ISSN: 2321-9939
[4]. An Efficient Approach for Security of Cloud Using Watermarking Technique, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013
[5]. A Survey on Security in Cloud Computing, Varsha Yadav et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 509-513
[6]. Data Leakage Detection and Security Using Cloud Computing, S.Geetha et. Al. Int. Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 6, Issue 3, (Part - 2) March 2016, pp.01-04
[7]. The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing, IJCSMC, Vol. 2, Issue. 4, April 2013, pg.333 – 339, ISSN 2320–088X.
[8]. A Cloud-User Protocol Based on Ciphertext Watermarking Technology, Security and Communication Networks, Volume 2017, Article ID 4376282,14 pages, https://doi.org/10.1155/2017/4376282
[9]. A method for trust management in cloud computing: Data coloring by cloud watermarking,International Journal of Automation and Computing 8(3):280-285 • August 2011
[10]. An Efficient Approach for Data Security in Cloud Environment using Watermarking Technique and RSA Digital Signatures, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 02 | FEB -2017.
[11]. A Secured Data Processing Technique for Effective Utilization of Cloud Computing, HAL Id: hal-01466986 https://hal.archives-ouvertes.fr/hal-01466986v2 Submitted on 21 Nov 2017.
[12]. A Survey about Cloud Computing and an Improved Method of Data Security using Watermarking Technique with RSA Algorithm in Cloud Environment, Asian Journal of Research in Social Sciences and Humanities Vol. 7, No. 5, May 2017, pp. 325-336
[13]. Secure Medical Images Sharing over Cloud Computing environment, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 5, 2013.
[14]. A Survey on Watermarking Methods for Security of Cloud Data, Mrs. Anitha P1 , Dr. Malini M Patil2 1.2Department of Information Science and Engineering, JSSATE (India), (ICRISEM-16), 26TH February 2016, www.conferenceworld.in.
[15]. Amandeep verma ,sakshi kaul ,”Cloud computing Issues & challenges :A survey “, Springer verlag Berlin Heidelberg, part IV,ccis 193,2011,pp.445-454.