International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 106

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian


Abstract: Privacy preserving is major concern when a user or data owner outsources the data through third party on cloud. The main task here is finding the structure of cloud computing so as to make it secure with the use of watermark detection. For dealing with such requirements, compressive sensing (CS) based layout along with using secure multi-party computation (MPC) protocols can be utilized. While in the CS conversion the secrecy is maintained by MPC of CS matrix and watermark reorganization. The data holder, the watermark owner and the cloud for storage of data are main major parts in this system. Homomorphism based Pallier public key and secrete sharing based techniques can be used for the conversion of the data. The secrecy is maintained by the semi-honest model as unique protocol is followed by all MPC models. The framework provides protection for multimedia data which is stored on cloud and condensed and republished legally. RIP (Restricted Isometric Property) plays a significant role for renovation of image. In CS, it includes the aimed image, watermark reorganization and size of CS matrix. Some of the methods used such as Normal Distribution with District Cosine Transformation (DCT) can be used for watermark detection. The accuracy of the extracted functionality is approved through experiments. The analysis and the results of experiments give realistic solution by means of watermark reorganization.


Keywords: digital, watermark, multimedia, encryption, compressive sensing, signal, processing, privacy, secure, multiparty computation


Edition: Volume 3 Issue 11, November 2014,


Pages: 651 - 653


How to Cite this Article?

Ujwala Pawar, Dhara Kurian, "Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT14900, Volume 3 Issue 11, November 2014, 651 - 653

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'digital'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Similar Articles with Keyword 'watermark'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Similar Articles with Keyword 'multimedia'

Downloads: 2

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 5, May 2021

Pages: 1130 - 1137

Artificial Intelligence: The Backbone of Industry Evolution, Impact, and Future

Ralph Tichafa Tawanda Chawatama, Sun Shaowei

Share this Article

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'compressive sensing'

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 57 - 62

The Hybrid Compressive Sensing Data Collection Method in Cluster Structure for Efficient Data Transmission in WSN

Bibi Ameena, Prof. Mallanagouda Biradar

Share this Article

Downloads: 143

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 247 - 250

Improved Clustering Based Routing Protocol for Wireless Sensor Networks

Naziya Naved Shaikh, Dr. M. U. Kharat

Share this Article

Similar Articles with Keyword 'signal'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Downloads: 91

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Similar Articles with Keyword 'processing'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'secure'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'multiparty computation'

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1608 - 1611

Secure Mining of Association Rules from Homogeneous Database

Mahale Mohini V., Shaikh I.R.

Share this Article

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 445 - 450

Efficient and Secure Data Sharing By Applying AES Algorithm with Anonymous Id Assignment

Barla Rakesh, Veladanda RamaKrishna

Share this Article
Top