A Novel Watermarking Method using Geographical Random Image for Cloud Computing based on DCT Reversible Color Hiding Algorithm

Size: px
Start display at page:

Download "A Novel Watermarking Method using Geographical Random Image for Cloud Computing based on DCT Reversible Color Hiding Algorithm"

Transcription

1 A Novel Watermarking Method using Geographical Random Image for Cloud Computing based on DCT Reversible Color Hiding Algorithm Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE branch, Dubai, UAE Amir Aghasharif Student of Department of Computer Engineering, Islamic Azad University, UAE branch, Dubai, UAE ABSTRACT With the fast development of Cloud computing, most of clients transfer their information and applications on the cloud to benefit from the cheap, easily accessible, and always available storage facilities. The development of the Internet has generally expanded the availability of digital data like images, audio and videos to the public. The fundamental problem in cloud computing is the security of the stored data. Digital watermarking is a technology that can used to secure the ownership of data saved on the public devices and facilitates data authentication for copyright protection of digital media. This paper explains the details of reversible color hiding for RGB image using DCT algorithm to extract the features of the favorite image and embed it into the cover image. In this paper, we have proposed a new watermarking method based on the Geographical Random Image (GRM). The random image is obtained from the Google earth map and client favorite location of the map. Since the selection of the image from Google map is random and client can easily change his favorite image location, it is impossible for the hacker to obtain the image location and corresponding generated code even using multicore systems and supercomputers. Once the RGB image is selected, then its corresponding compressed gray scale image will be obtained based on Malakooti-Khederzadeh reversible color hiding algorithm [13-15]. Our Proposed algorithm is used to hide the DCT coefficient of the random image, after the reversible color hiding algorithm is applied, into the cover image. To increase the availability and security of the stored data, we have used the Malakooti-Mansourzadeh Data Redundancy Algorithm (MMDRA) [14], a modified version of DEPSKY, to store the watermarked images into several different clouds. This algorithm secures the availability and accessibility of the stored data. Keywords: Cloud Computing, DEPSKY, DCT, Google Map, Random Image I. INTRODUCTION The Cloud Computing has received high attention among scientist, engineers, and even industrial communities due to its cheap and easy access storage facilities, as well as the reliable, secure and competitive hardware and software platforms, necessary technology for the data storage and retrieval, data processing and recovery. N. Jain and G. Kaur [1], have introduced a method for Implementing DES Algorithm in Cloud environment for Data Security. Cloud Computing relies on sharing of sources to empowers useful online facilities and provides on-demand network access to a large pool of commuting resources including the shared hardware and software facilities and services. With the use of Cloud Computing, the resource can be accessed easily around the world with the minimum controlling attempts and less communication problem and delays. The core objective of the Cloud Computing is to provide quick, secure, and reliable data storage and retrieval facilities, as well as a computational idea for the distributed model [2-3]. Cloud resource not only shared by the multiple-user but dynamically re-allocate per demand. In general the cloud computing is involved in delivering the hosted services over the internet. These services are usually divided into three main categories such as infrastructureas-a-service (IaaS), Platform-as-a service (PaaS), and Software-as-a Service(SaaS). The Cloud Computing has a good potential to decrease the cost of data storage and retrievals as well as to provide the availability, scalability, and dependability [3-4-7]. Digital watermarking is the act of hiding a message or a digital signal within the original signal where the message is related to the original signal. A good example of watermarking is hiding the patient vital information within the images taken from MRI examination of patient s head. Physicians normally use these MRI images to diagnose the ISBN: SDIWC 53

2 syndrome and to detect the patient s abnormality. For patient psychological health protection, some of these syndromes such as brain tumor, stroke, vascular problem such as arterial occlusion (blockage), cause of epilepsy (seizure), and so on need to be kept secret from patient. The watermarking process can be used to embed all syndromes and vital information related to the patients inside the MRI images after diagnosis is completed by team of professional physicians. In this type of watermarking the embedded message is the patient vital information that can be to identify the individual patients from the watermarked signal. Similarly, in video broadcasting information related to each individual can be embedded inside the video itself before transmission that can be used to detect the individual information from the watermarked video for the benefits of broadcast monitoring and individual video authentication. In most watermarking techniques the embedded signal or secret message used for watermarking purpose are not related to the original signal. The message usually can be used as the company logo, use of the favorite image or even some specific text that can be used for the ownership verification and authentication. This type of watermarking in which the secret message and original signal is not related is called Steganography but in literature most of researchers used the word of Watermarking even in the case where the message is not related to original signal. Digital watermarking has been used to apply the security, data authentication and copyright protection to the digital signals. Digital watermarking has several applications in ownership verification, copyright protection, and individual authentication. The watermarking techniques include two different algorithms, one for data embedding and one for data extraction. We have introduced the Cloud Computing security issues in section II. The image Watermarking and its feature are presented in section III. The remainder of the paper is organized to explain our proposed method, the new model of cloud computing for the data redundancy and availability as well as digital watermarking technique to secure the wireless transmitted data. II. CLOUD COMPUTING SECURITY Cloud computing is the main tool for small, medium and large companies in these days, but since many customers look for cloud computing services, the fundamental problem is security of their data. Data security is a necessary issue in cloud computing and in order to provide this security an appropriate method is required. With the introducing of multiple users and multiple enterprises, new security concerns arise. Therefore multitenancy, protection against velocity of attack, information assurance, data privacy and ownership are required. Some of the data security issues in the cloud are as following: 1. Privacy and confidentiality: privacy is one of the cloud computing concerns. So how do you make sure that the privacy of data is ensured in the cloud computing environment? Because multiple users and multiple enterprises may use same infrastructure. While users store their data on the cloud storage, the data must be accessible just by authorized people. Moreover, unsuitable access to user important data by cloud provider is another concern. Therefore, cloud users have to be assured which data on the cloud will be secret. 2. Data integrity: after preparing data security, cloud service provider has to perform mechanisms to guarantee data security and can discover what has happened to a specific data and the place of that data. Thus, as a result of that the user has to know about the original data and integrity mechanisms. For conformance, it is necessary to have accurate records for knowing what data was located in a public cloud. When it happens, which virtual machine and storage it exists within on, and where it was adapted. Based on applied data integrity, information must be protected and prevent revealing of data beyond the agreed domain. 3. Data location and relocation: cloud computing suggests an upward degree of data mobility. Always, users have no idea about the location of data, although a corporation that stores the important data in the cloud wants to know the place of the data. They also prefer to indicate the location. So it should be an agreement between cloud provider and user. Another problem is the transferring of data from one location to another. III. WATERMARKING AND FEATURES Digital watermarking consists of different ideas and methods like cryptography, stochastic theory, signal processing, network technology, probability theory and algorithm design. Digital watermarking masks the copyright data into the digital data by using of different algorithms. The secret and important data such as logo, text, serial number and images, is embedded to the digital data (images, audio, and video) to provide the security and identification of data owner [5-6]. Different characteristics of digital watermarking are as follows: 1. Imperceptibility: In watermarking method, it is impossible to see the information with human eyes and only authorized agents can recognize the important data by using certain processing. 2. Robustness: Robustness indicates that watermark information, which is embedded in data, has the capability of retrieving after different processes and attacks. So, the watermark should be robust for signal processing, geometrical transformation and attacks [7-8]. 3. Verifiability: Watermark must be able to prepare complete and safe documentation for the ownership of copyright-protected data products to show whether the information is to be secured and to control the distribution of the information, ISBN: SDIWC 54

3 determine the reliability, and monitor unauthorized copying. 4. Security: If the attacker cannot retrieve the data watermark, our method is secure, so only authorized users can access to the data. This requirement is usually achieved by the use of cryptographic keys [9-10]. 5. Capacity: Capacity of the watermarking system is the maximum amount of data, which can be placed in the cover information. Thus the number of watermark bits in data and the maximum repetition of data within an image is the watermark capacity [11-12]. IV. PROPOSED MODEL In this paper we only focused on the security of the stored images on the cloud environment but it can be applied on other kinds of information such as, voice, text, multimedia, and even movies. First of all we have to ask the user to enter the favorite location and select it on the map as its shown in the Figure 1. that image. Since the selection of favorite area is different for any user, the attacker cannot be able to retrieve the information. In the next step we have to follow the color hiding process as shown in the figure 3. Color Hiding Process: 1. Divide the main matrix into the Red, Green and Blue matrices. 2. Use the DCT Transform on each 8x8 Block of the Red, Green, and Blues matrices. 3. Scale the DCT coefficients of low frequency part in Green and Blue matrices and insert them in to the upper mid frequency and high frequency parts in Red DCT matrix. 4. Use the IDCT on the resulting DCT coefficient matrix [13-14]. Fig 1- Requested map by user In the next step the grid map is illustrated for the user to select the favorite area. Each user chooses the area based on his/her interests. Thus, it is difficult to guess the exact location of selected map by attackers. After that the image of square area should be taken and be stored for the watermarking processing, Figure 2. Fig 3- Color Hiding Process The embedding algorithm that we have used to hide the features of the main image is as following: 1. We should have a bitmap image, since imread command in Matlab program only accept bitmap images and it can divide the Bitmap Color Matrices into three blocks of 8*8 Red, Green and Blue matrices figure 3. Fig 2- Selection of favorite area Now user has to upload the image to store on the cloud, but before that the watermarking method should be applied on (1) ISBN: SDIWC 55

4 Equation 1 has divided the Red matrices into the 8*8 Blocks of image data and similar equation is applied on Green and Blue matrices. 2. Use DCT on each 8x8 block figure 3. Matrix, T, is calculate by the equation 3: (2) Fig 5- Store the watermark image into four different cloud providers (3) We consider that N=8, i and j are started from 1 to We also have applied the IDCT on each blocks of 8 x 8 to retrieve the embedded information. 4. Return back to step 1 and repeat from step 1 to 3 until all 8*8 sub-blocks have been processed. 5. When the embedding process is completed we have obtained the secure Image, which can be transferred over the network and carry the secret data with high security [ ]. In this scenario we have four copies of watermark image and can retrieve the original image just from any cloud provider. The cost of storing four copies of coded image would be high but the security is very high too [ ]. Scenario 2: When, the group image is watermarked then it will be stored into four cloud providers (AD,BC,CB,DA) or six cloud providers(ad,bc,cb,da,bc,ad) depend upon the type of the stored data, where A,B,C, and D are representative of 4-sub images. Finally we have applied the watermarking technique on main image figure 4. Fig 6- Divide the image and distribute the parts into Four cloud providers Fig 4- Watermarking Image Implementation We apply our watermark image on two different scenarios: Scenario 1: In the second scenario, Figure 6, if the cloud provider s number 2 and 3 have failed simultaneously or are inaccessible then we will lose 50% of our image information. To solve this issue we have stored image stored in parts BC and AD into two other cloud providers, totally six cloud providers to provide the high degree of security, availability, and accessibility figure 7 [ ]. In scenario 1 the group image is watermarked according to our proposed algorithm as explained before. So, the watermark image will be divided into four. This watermark image will be stored into four different cloud storages for the sake of security, data availability and accessibly figure 5. ISBN: SDIWC 56

5 REFRENCES [1]N.Jain, G.Kaur, Implementing DES Algorithm in Cloud for Data Security, VSRD-IJCSIT, Vol. 2, [2] K.S.Suresh, K.V.Prasad, Security Issues and Security Algorithms in Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 10, [3]M.Kaur, M.Mahajan, Implementing various encryption algorithms to enhance the data security of cloud in cloud computing, VSRD International Journal of Computer Science & Information Technology, Vol. 2 No. 10, October Fig 7- Divide the image and distribute the parts into six cloud providers V. CONCLUSIONS AND FUTURE WORK Cloud Computing has improved the data storage and service availability but the security issues are not resolved yet. One of the most important problems in cloud computing is that the user s data are no longer under his control. Moreover, the data privacy and confidentiality issues have not been resolved. We have presented a robust Security Model for Cloud Computing Based on the Digital Watermarking. In addition to our Watermarking algorithm we have applied two different scenarios similar to DEPSKY to increment the viability and accessibility. Our algorithm has better result than Depsky model since addition Watermarking algorithm is applied before the storage process. In this paper, a lossless and high capacity data-hiding technique is proposed based on the DCT algorithm to embed the important data into the cover image. The embedding capacity calculated according to the number of DCT steps, the block size, and number of selected DCT coefficients in each block. So the embedding capacity is quite limited. To improve the embedding capacity of the cover image, we have conducted several tests for the adaptive capacity estimation based on the levels of DCT, size of image block, and number of selected coefficient in mid-frequency. The result of simulation indicates that we can change the indicated parameters and increment the embedding capacity although there is a tradeoff between the image quality and the embedding capacity. An adaptive smart algorithm is needed to calculate the maximum capacity of the embedding algorithm while the image is not distorted and its quality satisfies some predefined threshold. [4]P.Kalpana, S.Singaraju, Data Security in Cloud Computing using RSA Algorithm, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN , Vol 1, Issue 4, September [5]D.Yuefa, Wu Bo, G.Yaqiang, Z.Quan, Tang Chaojing,, Data Security Model for Cloud Computing, Proceeding of IWISA 2009, Nov. 2009, P ,Qingdao, China. [6] K. Govinda, Y.Ngabirano,, Secure Data Storage in Cloud Computing Using Biometric, IJARCSSE, Vol. 2, Issue 5, May 2012,P [7] M.Marwaha, R.Bedi, Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, P , January [8] A.Bessani, M.Correia, B.Quaresma F.Andr e Paulo Sousa, DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds, University of Lisbon, Faculty of Sciences, Portugal. [9] E.Gorelik, Cloud Computing Models, Massachusetts Institute of Technology, January [10] S. Ajoudanian, M. R. Ahmadi, A Novel Data Security Model for Cloud Computing, IACSIT International Journal of Engineering and Technology, Vol. 4, No. 3, June [11] Cloud Special Interest Group & PCI Security Standards Council, PCI DSS Cloud Computing Guidelines, February [12] A.Ross, A.K. Jain, Human Recognition Using Biometrics, Appeared in Annals of Telecommunications, Vol. 62, No. 1/2, pp , Jan/Feb [13] M.V. Malakooti, N.Mansourzdeh, A Robust Information Security Model for Cloud Computing based on the Scrambling Algorithm and Multilevel Encryption, ICCTIM, 2104, Dubai, UAE, pp [13] M.V. Malakooti, M. Khederzadeh, A Robust and Lossless Information Embedding in Image Based on DCT ISBN: SDIWC 57

6 and Scrambling Algorithms, Islamic Azad University, Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014 [14] M.V. Malakooti, N.Mansourzadeh, A Two Level- Security Model for Cloud Computing based on the Biometric Features and Multi-Level Encryption, Islamic Azad University, The Proceedings of the International Conference on Digital Information Processing, Data Mining, and Wireless Communications, Dubai, UAE, 2015 [15] M.V. Malakooti, A.Aghasharif, Prediction of Stock Market Index based on Neural Networks, Genetic Algorithms, and Data Mining Using SVD, Islamic Azad University, The Proceedings of the International Conference on Digital Information Processing, Data Mining, and Wireless Communications, Dubai, UAE, 2015 [16] M.V. Malakooti, N.Mansourzadeh, A Robust Information Security Model for Cloud Computing Based on the Scrambling Algorithm and Multi-Level Encryption, Islamic Azad University, The International Conference on Computing Technology and Information Management, Dubai, UAE, 2014 ISBN: SDIWC 58

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Triple Security of Information Using Stegnography and Cryptography

Triple Security of Information Using Stegnography and Cryptography Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all

More information

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

More information

A Novel Cryptographic Key Generation Method Using Image Features

A Novel Cryptographic Key Generation Method Using Image Features Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

encoding compression encryption

encoding compression encryption encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -

More information

Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment

Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Online Voting System Powered by Biometric Security using Cryptography and Stegnography ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Online

More information

Data Leakage Detection in Cloud Computing using Identity Services

Data Leakage Detection in Cloud Computing using Identity Services International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Data Leakage Detection in Cloud Computing using Identity Services K. Mythili 1*,

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: yyalman@turgutozal.edu.tr RESEARCH

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 2, Issue 5, Nov 2013, 55-60 IASET REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES

DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES Al-Khanjari, Z. Alani, A. Department of Computer Science, College of Science, Sultan Qaboos University, Muscat, Oman Abstract Developers of cloud

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Alternative security architecture for IP Telephony based on digital watermarking

Alternative security architecture for IP Telephony based on digital watermarking Alternative security architecture for IP Telephony based on digital watermarking Wojciech Mazurczyk 1, Zbigniew Kotulski 1,2 1 Warsaw University of Technology, Faculty of Electronics and Information Technology,

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Online Voting System Using Three Factor Authentication

Online Voting System Using Three Factor Authentication ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai

More information

M.Tech. Software Systems

M.Tech. Software Systems M.Tech. Software Systems Input Requirements Employed professionals holding an Integrated First Degree of BITS or its equivalent in relevant disciplines, with minimum one year work experience in relevant

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2 IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,

More information

Scientific Journal Impact Factor (SJIF): 1.711

Scientific Journal Impact Factor (SJIF): 1.711 Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

An Efficient data storage security algorithm using RSA Algorithm

An Efficient data storage security algorithm using RSA Algorithm An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,

More information

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Secret Sharing based on XOR for Efficient Data Recovery in Cloud Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, kimsh@sch.ac.kr

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0 PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved

More information

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information