Enhancing image security and privacy in cloud system using steganography

Author(s):  
Wen-Chuan Wu ◽  
Shang-Chian Yang
2021 ◽  
Vol 35 (1) ◽  
pp. 85-91
Author(s):  
Naga Raju Hari Manikyam ◽  
Munisamy Shyamala Devi

In the contemporary era, technological innovations like cloud computing and Internet of Things (IoT) pave way for diversified applications producing multimedia content. Especially large volumes of image data, in medical and other domains, are produced. Cloud infrastructure is widely used to reap benefits such as scalability and availability. However, security and privacy of imagery is in jeopardy when outsourced it to cloud directly. Many compression and encryption techniques came into existence to improve performance and security. Nevertheless, in the wake of emergence of quantum computing in future, there is need for more secure means with multiple transformations of data. Compressive sensing (CS) used in existing methods to improve security. However, most of the schemes suffer from the problem of inability to perform compression and encryption simultaneously besides ending up with large key size. In this paper, we proposed a framework known as Cloud Image Security Framework (CISF) leveraging outsourced image security. The framework has an underlying algorithm known as Hybrid Image Security Algorithm (HISA). It is based on compressive sensing, simultaneous sensing and encryption besides random pixel exchange to ensure multiple transformations of input image. The empirical study revealed that the CISF is more effective, secure with acceptable compression performance over the state of the art methods.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Chaimae Saadi ◽  
Habiba Chaoui
Keyword(s):  

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2017 ◽  
Vol 3 (2) ◽  
pp. 29
Author(s):  
NURHAZIRAH HASHIM ◽  
MOHAMMAD ZAIM MOHD SALLEH ◽  
NOR SARA NADIA MUHAMAD YUNUS ◽  
INTAN SYAFINAZ MAT SHAFIE

The recent development in the ecommerce services has shown a variety of established companies participating in the web business environment including Islamic banks. Business with the mostexperience and success in using ecommerce are beginning to realize that the indicator of success or failure of the ecommerce environment was included in the online services. Nowadays, the trend ofa business is to serve the customer with best quality of services to enhance the consumer satisfaction and compete with the global competitors as online services enabled registered user to make productspurchase transaction only through website such as check and manage financial standing, transfer funds, bill payment, prepaid reload and so forth. However, in recent times, Islamic banking users faced problems with the online system such as cannot log in to the system, payment failure and  mostly security and privacy hindrance. Therefore, this study aimed to investigate the relationship between electronic service quality (e-SERVQUAL) and customer satisfaction towards IslamicOnline Banking Services users. Based on the sample size, only 76 respondents were selected to participate in this study by using a convenience sampling. Further, Pearson correlation and multipleregression were reported to analyze the mentioned relationship. The findings have shown that there is a positive relationship between e-SERVQUAL and customer satisfaction in using Islamic onlinebanking services. Based on the findings, Islamic online banking developer is recommended to improve more on their responsiveness in order to provide quick response to their customer’s requirements.  Moreover, they also should be more reliable in providing accurate information in performing the promised services. They must assure that all of their customers can quickly get responds and true feedback regarding their problems to ensure customer satisfy with service provided. Besides, the safety of the website and the protection of customer information alsoconsidered a vital action that should be concerned in order to increase the customers’ satisfaction.


Sign in / Sign up

Export Citation Format

Share Document