Secure Watermarking Technique for Emerging Clouds

نویسندگان

  • R. VINOTH
  • S. SIVASANKAR
چکیده

Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized datacenter resources, uphold user privacy, and preserve data integrity. It is suggested using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques Safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A secure digital camera architecture for integrated real-time digital rights management

This paper presents a novel concept of a secure digital camera (SDC) with a built-in watermarking and encryption facility. The motivation is to facilitate real-time digital rights management (DRM) by using the SDC right at the source end of multimedia content. The emerging field of DRM systems addresses the issues related to the intellectual property rights of digital content. The use of digita...

متن کامل

Survey on Different Level of Audio Watermarking Techniques

Audio Watermarking is useful technique for audio systems. This technique can work on different domains like frequency and time. By using the different scheme of watermarking at different levels of audio, it can be secure from many types of attacks. This paper shows some techniques which can be used to secure the audio system from attacks and survey on various transformation techniques for embed...

متن کامل

Design of Secure Watermarking Scheme for Watermarking Protocol

Watermarking technique enables to hide an imperceptible watermark into a multimedia content for copyright protection. However, in most conventional watermarking schemes, the watermark is embedded solely by the seller, and both the seller and the buyer know the watermarked copy, which causes unsettled dispute at the phase of arbitration. To solve this problem, many watermarking protocols have be...

متن کامل

Secure Authentication Watermarking for Binary Images

Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authentication watermarking without making use of the solid cryptography theory and techniques. In a cryptography-based authentication watermarking, a message authentication code (or digital signature) of the whole image is computed ...

متن کامل

Efficient Watermarking Technique using DWT, SVD, Rail Fence on Digital Images

This paper presents an efficient watermarking technique based on Discrete Wavelet Transformation (DWT), Singular Value Decomposition (SVD) and Rail Fence methods that are applied on grey scale and digital color images. First of computation of 10‟s complement and rail-fence method is applied on watermark image that results in modified watermark image. The singular values of a modified watermark ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011