International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
E-ISSN: 2349-7300Impact Factor - 9.907

A Widely Indexed Open Access Peer Reviewed Online Scholarly International Journal

Call for Paper Volume 13 Issue 2 March-April 2025 Submit your research for publication

Data Leakage Avoidance in Cloud Storage Using Watermarking and Re- Encryption

Authors: Kokila. S, Nivya. R

Country: USA

Full-text Research PDF File:   View   |   Download


Abstract: Multimedia data sharing is becoming a more vital component of end users' daily life as they access numerous systems, services, and applications. Data leaking occurs frequently in cloud storage systems in the real world. Safe data transmission media have long struggled with the authentication as well as copyright protection of multimedia information. The situation has gotten worse with the rising usage of a Internet and digital technologies. Contrarily, copyright protection is more challenging to apply and more complicated. The issue of copyright protection was addressed with the suggestion of using digital watermarking. The suggested method for effective multimedia material exchange uses watermarking as well as Proxy Re-encryption (PRE). In digital content like images, watermarking is a technique for hiding information, such secret information. To protect data, encryption techniques are utilized. Unlawful parties cannot read the information since it is encrypted to prevent unauthorized access. The recommended approach uses an encryption method that encrypts the secret key with the aid of a key. The user's secret key is then blended with encrypted key data as well as inserted within the image using LSB (Least Significant Bit). The image could be encoded to use the ECC Encryption method after secret information has indeed been added. Finally, an authenticated people can recover the decryption key using the built-in data verification method. It has the potential to identify unauthorized or illegal access whenever user’s data does not match encoded data. In a cloud context, this suggested application helps with the identification of unwanted access as well as the restriction of content redistribution.

Keywords: Multimedia sharing, Cryptography, Watermarking, Proxy- re-encryption, Copy right protection


Paper Id: 232052

Published On: 2025-01-24

Published In: Volume 13, Issue 1, January-February 2025

Share this