Article Preview
TopIntroduction
The buzzword to assist certain peculiar aspects of elasticity and scalability is Cloud. The prime motivation behind moving towards cloud is that it is a ubiquitous way to access any kind of resources and its existence in multiple forms in terms of deployment models and services provided by them. Based on the workload execution and the level of requirement the appropriate model can be chosen by people. On the other end, an essential technique which is required to upgrade the level of security of image without image distortion is digital image fusion, with secret data hidden inside while propagating from sender to receiver (Priya et al., 2014; Patil et el., 2011). Any form of digital data needs to have the copyright protection while arriving at the destination as it might be difficult enough to separate the actual data from the one which is edited without any compromise with the quality attacked by the intruders (Siddiqui et al., 2017).
If the security of enormous set of images is to be achieved, then a storehouse which acts as a suitable platform for such huge set is cloud. It is to be noted that the storage of the image by the third party is not free of threat under all circumstances. Particularly nowadays in various Social networking sites like linkedIn, facebook etc where the users post and upload the photos out of excitement can be used in a contrary way for generating duplicate identity of individuals, an additional security layer is needed (Gupta et al. 2017). In this work, the diverse fields of image processing and cloud computing have been attempted to integrate so that the security of image that is being transmitted across the internet can be further strengthened.
In e-commerce, watermarking has a big role which result of convenient and quick exchange of multimedia data now a day is because of the rapidly increasing use of the internet (Kumar et al., 2014; Kumar et al., 2015). If information is to be embedded into, some digital content with the major intension of illegal redistribution of traced pirated copy then for this Digital copyright is an emerging technique. There have been many watermarking schemes that have been developed for exploring out the illegal copies of digital content (Kumar et al., 2015; Kumar et al., 2017). According to Dittman et al. there are a total of five groups into which watermarking can be classified based on their application area. Two of its major classifications are copy control watermarks and fingerprint and these forms an essential part and play a very important role in a DRM system.