Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/366084
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2022-03-01T07:17:34Z | - |
dc.date.available | 2022-03-01T07:17:34Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/366084 | - |
dc.description.abstract | Cloud computing is an emerging technology for providing convenient, network newlineaccess for sharing of computing resources such as storage, network, software, newlinehardware and services as per pay basis. Cloud Service Provider (CSP) can newlineprovide those resources including lots of services to the user as per their newlinerequirement. As many companies can provide the storage space to the users, newlineGoogle drive, Microsoft skydrive can provide minimum 5 GB free space. Users newlinecan access the data anywhere in the world. Not only providing the storage, newlineCloud can secure their data whatever stored on it. It can store the multimedia newlinedata such as images, photos, audio, video and other text document also. While newlineoutsourced the image data to the cloud, security risks and image privacy are the newlinetwo major concerns for cloud environment. Even untrusted CSP may possible newlineto share the user s data to unauthorized user for their own profit. CSP called as newline honest but curious . For protecting the image, digital image can be processed before stored in the newlinecloud. Digital image processing is a technique which has processed the raw newlineimage collected from camera image/pictures, personal image, satellite image, newlinemedical image taken in day-to-day life. There are majorly two fundamental newlinetechniques are used in digital image processing such as image encryption and newlinecompression in order to enhance the security and bandwidth utilization at the newlinesame time. The traditional encryption techniques such as AES, RSA, DES and newlinemany more techniques are not suitable for the images. The two most advanced newlinetechniques are introduced in the proposed work such as Chaotic system for key newlinegeneration and DNA cryptography to make stronger and more confusion. Chaotic system is a famous and a next generation technique which is sensitive newlinefor initial values and facilitates high complexity. It has some characteristics such newlineas dynamic, ergodicity, reproduction and PRP to make the encryption strong newlineand avoiding attacks. It provides stronger large key space. The larger key space newlineprovides higher security. | |
dc.format.extent | ||
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | iPrivacy A Fast and Efficient Privacy Preserving Outsourced Image Sharing Technique in Cloud Storage | |
dc.title.alternative | ||
dc.creator.researcher | Sankari, M | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Artificial Intelligence | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | Cloud Computing, Digital Image Processing, DNA, Image Encryption, Image Privacy, 5D Hyperchaotic system. | |
dc.contributor.guide | Ranjana, P | |
dc.publisher.place | Chennai | |
dc.publisher.university | Hindustan University | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 2015 | |
dc.date.completed | 2022 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | ||
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10_ literature.pdf | Attached File | 534.81 kB | Adobe PDF | View/Open |
11_materials.pdf | 1.09 MB | Adobe PDF | View/Open | |
12_discussion.pdf | 147.89 kB | Adobe PDF | View/Open | |
13_result.pdf | 1.11 MB | Adobe PDF | View/Open | |
14_summary.pdf | 126.53 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 123.2 kB | Adobe PDF | View/Open | |
16_future.pdf | 9.71 kB | Adobe PDF | View/Open | |
1_front page.pdf | 118.96 kB | Adobe PDF | View/Open | |
2_bonafide.pdf | 101.5 kB | Adobe PDF | View/Open | |
2_proceeding.pdf | 16.18 MB | Adobe PDF | View/Open | |
3_ack.pdf | 13.17 kB | Adobe PDF | View/Open | |
4_contents.pdf | 33.99 kB | Adobe PDF | View/Open | |
5_declaration.pdf | 68.38 kB | Adobe PDF | View/Open | |
6_abbreviations.pdf | 127.76 kB | Adobe PDF | View/Open | |
6_figures.pdf | 13.02 kB | Adobe PDF | View/Open | |
7_tables.pdf | 13.41 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 396.42 kB | Adobe PDF | View/Open | |
8_abstract.pdf | 130.22 kB | Adobe PDF | View/Open | |
9_introduction.pdf | 341.72 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: