Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection

Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection

Ashwani Kumar (Department of Computer Science and Engineering, Vardhaman College of Engineering, Shamshabad, Hyderabad, India)
Copyright: © 2019 |Pages: 15
DOI: 10.4018/IJCAC.2019070102
OnDemand PDF Download:
No Current Special Offers


Nowadays, the use of digital content or digital media is increasing day by day. Therefore, there is a need to protect the digital document from both unauthorized users and authorized users. The digital document should be protected from authorized users who try to redistribute it illegally. Digital watermarking techniques along with cryptography are insufficient to ensure an adequate level of security of digital media. The security of the transferring digital data in the modern world is also a big challenge because there is a high risk of security breaches. In this article, a secure technique of image fusion using hybrid domains (spatial and frequency) for privacy preserving and copyright protection is proposed. The proposed method provides a secure technique for the digital content in cloud environment. Two cloud services are used to develop this work, which eliminates the role of a trusted third party (TTP). First is the design of an infrastructure as a service (IaaS) to store different images with encryption processes to speed up the image fusion process and save storage space. Second, a Platform as a Service (PaaS) is used to enable the digital content to improve computation power and to increase the bandwidth. The prime objective of the proposed scheme is to transfer the digital media between a service provider and customer in a secure way using a hybrid domain along with cloud storage. Imperceptibility and robustness measures are used to calculate the performance of the proposed approach.
Article Preview


The buzzword to assist certain peculiar aspects of elasticity and scalability is Cloud. The prime motivation behind moving towards cloud is that it is a ubiquitous way to access any kind of resources and its existence in multiple forms in terms of deployment models and services provided by them. Based on the workload execution and the level of requirement the appropriate model can be chosen by people. On the other end, an essential technique which is required to upgrade the level of security of image without image distortion is digital image fusion, with secret data hidden inside while propagating from sender to receiver (Priya et al., 2014; Patil et el., 2011). Any form of digital data needs to have the copyright protection while arriving at the destination as it might be difficult enough to separate the actual data from the one which is edited without any compromise with the quality attacked by the intruders (Siddiqui et al., 2017).

If the security of enormous set of images is to be achieved, then a storehouse which acts as a suitable platform for such huge set is cloud. It is to be noted that the storage of the image by the third party is not free of threat under all circumstances. Particularly nowadays in various Social networking sites like linkedIn, facebook etc where the users post and upload the photos out of excitement can be used in a contrary way for generating duplicate identity of individuals, an additional security layer is needed (Gupta et al. 2017). In this work, the diverse fields of image processing and cloud computing have been attempted to integrate so that the security of image that is being transmitted across the internet can be further strengthened.

In e-commerce, watermarking has a big role which result of convenient and quick exchange of multimedia data now a day is because of the rapidly increasing use of the internet (Kumar et al., 2014; Kumar et al., 2015). If information is to be embedded into, some digital content with the major intension of illegal redistribution of traced pirated copy then for this Digital copyright is an emerging technique. There have been many watermarking schemes that have been developed for exploring out the illegal copies of digital content (Kumar et al., 2015; Kumar et al., 2017). According to Dittman et al. there are a total of five groups into which watermarking can be classified based on their application area. Two of its major classifications are copy control watermarks and fingerprint and these forms an essential part and play a very important role in a DRM system.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing