This paper is published in Volume-3, Issue-3, 2017
Area
Image Security
Author
T. E Bavisha, Ms. M. Madlin Asha
Org/Univ
Vivekanandha College of Engineering For Women(Autonomous), Tiruchengode, Tamil Nadu, India
Pub. Date
05 June, 2017
Paper ID
V3I3-1468
Publisher
Keywords
User Keyword, One Time Password (OTP), AES 128 bit Encryption/Decryption, Watermark, Segmentation, Least Significant Bit (LSB) Steganography, locality Sensitive Hashing(LSH).

Citationsacebook

IEEE
T. E Bavisha, Ms. M. Madlin Asha. A Trinity Approach for Secure Image Access and Retrieval in Cloud, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
T. E Bavisha, Ms. M. Madlin Asha (2017). A Trinity Approach for Secure Image Access and Retrieval in Cloud. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.

MLA
T. E Bavisha, Ms. M. Madlin Asha. "A Trinity Approach for Secure Image Access and Retrieval in Cloud." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.

Abstract

Images play an important role in human’s day to day life and it consumes much more space for storage rather than other formats. Hence, the need for cloud storage outsourcing arises. The Privacy of user and transfer of images in the network is the main concern. For privacy-preservation purposes, sensitive images, such as medical and personal images are needed to be encrypted before outsourcing, which makes the CBIR technique on plaintext realm to be inoperative. To ensure user privacy, a keyword based technique is introduced to provide individuality for the users. User validation for accessing their images from the cloud is provided by generating an OTP. The cryptography and segmentation techniques are upholding image security during transfer. Additionally, the illicit publication of user images is recognized with the help of watermark extraction.