{"title":"一种用于云数据安全的图像加密机制","authors":"A. Markandey, S. Moghe, Y. Bhute, S. Honale","doi":"10.1109/GHTC-SAS.2014.6967588","DOIUrl":null,"url":null,"abstract":"Recently, it is observed that the maximum attention is paid towards the problem of the data hacking. For that, various numbers of techniques are available in the market, like the steganography. In this process, the data is embedded in the image and that image is transformed to the receiver. But there are some problems such as after data extraction the image quality is hampered due to some noise. The technique called as reversible data hiding (RDH) is used here to embed the data in the image. The existing systems use the technique of the “vacating the room after encryption” which is time consuming. So the technique in the proposed system is to allocate the memory before the encryption process. Also the cloud computing technology is included in this proposed system. Here the cloud server is providing the service to the client called as the Data Security. Also in the result image quality is improving with the PSNR = 60 dB and above.","PeriodicalId":437025,"journal":{"name":"2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"An image encryption mechanism for data security in clouds\",\"authors\":\"A. Markandey, S. Moghe, Y. Bhute, S. Honale\",\"doi\":\"10.1109/GHTC-SAS.2014.6967588\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, it is observed that the maximum attention is paid towards the problem of the data hacking. For that, various numbers of techniques are available in the market, like the steganography. In this process, the data is embedded in the image and that image is transformed to the receiver. But there are some problems such as after data extraction the image quality is hampered due to some noise. The technique called as reversible data hiding (RDH) is used here to embed the data in the image. The existing systems use the technique of the “vacating the room after encryption” which is time consuming. So the technique in the proposed system is to allocate the memory before the encryption process. Also the cloud computing technology is included in this proposed system. Here the cloud server is providing the service to the client called as the Data Security. Also in the result image quality is improving with the PSNR = 60 dB and above.\",\"PeriodicalId\":437025,\"journal\":{\"name\":\"2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GHTC-SAS.2014.6967588\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GHTC-SAS.2014.6967588","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An image encryption mechanism for data security in clouds
Recently, it is observed that the maximum attention is paid towards the problem of the data hacking. For that, various numbers of techniques are available in the market, like the steganography. In this process, the data is embedded in the image and that image is transformed to the receiver. But there are some problems such as after data extraction the image quality is hampered due to some noise. The technique called as reversible data hiding (RDH) is used here to embed the data in the image. The existing systems use the technique of the “vacating the room after encryption” which is time consuming. So the technique in the proposed system is to allocate the memory before the encryption process. Also the cloud computing technology is included in this proposed system. Here the cloud server is providing the service to the client called as the Data Security. Also in the result image quality is improving with the PSNR = 60 dB and above.