Abstract
In this multimedia era, the security of the multimedia content over Cloud becomes a crucial research area. There are several modes of communication available for transmitting the information over the Cloud from one place to another place around the globe. Such communication networks are open to all, where anyone can access very easily. To abate the crimes, there are so many techniques evolved, such as RSA, DES, Elgamal, etc. However, these techniques seem limited to provide security to the user’s data. This work highlights a novel multimedia encryption model over Cloud, where the key is generated dynamically without involving the user by making the use of the original information. It creates difficulty for an attacker to break the cipher in a reasonable time, and there is no chance for an attacker to guess the key because the key is independent of the user’s behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kunal, K.M., et al.: A mathematical model for secret message passing using stenography. In: IEEE ICCIC, pp. 1–6 (2016)
Krishan, K., et al.: Eratosthenes sieve based key-frame extraction technique for event summarization in videos. MTAP 77, 7383–7404 (2018)
Kumar, K., et al.: F-DES: fast and deep event summarization. IEEE TMM 20, 323–334 (2018)
Kumar, K., et al.: ESUMM: event summarization on scale-free network. IETE TITR (2018). https://doi.org/10.1080/02564602.2018.1454347
Li, M., et al.: Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system. IEEE MultiMed. (2018). https://doi.org/10.1109/MMUL.2018.112142439
Abdalla, A.A., et al.: On protecting data storage in mobile cloud computing paradigm. IETE TITR 31, 82–91 (2014)
Iswari, N.M.S.: Key generation algorithm design combination of RSA and ElGamal algorithm. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 1–5. IEEE, October 2016
Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. In: 2013 IEEE Second International Conference on Image Information Processing (ICIIP), pp. 607–611. IEEE, December 2013
Gowda, S.N.: Advanced dual layered encryption for block based approach to image steganography. In: International Conference on Computing, Analytics and Security Trends (CAST), pp. 250–254. IEEE, December 2016
Gowda, S.N.: Dual layered secure algorithm for image steganography. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 22–24. IEEE, July 2016
Pillai, B., Mounika, M., Rao, P.J., Sriram, P.: Image steganography method using k-means clustering and encryption techniques. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1206–1211. IEEE, September 2016
Chen, C.C., Wu, W.J.: A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 92, 107–114 (2014)
Yang, C.N., Chen, C.H., Cai, S.R.: Enhanced Boolean-based multi secret image sharing scheme. J. Syst. Softw. 116, 22–34 (2016)
Goel, A., Chaudhari, K.: FPGA implementation of a novel technique for selective image encryption. In: International Conference on Frontiers of Signal Processing (ICFSP), pp. 15–19. IEEE, October 2016
Reddy, V.P.K., Fathima, A.A.: Efficient encryption technique for medical X-ray images using chaotic maps. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 783–787. IEEE, March 2016
Rohith, S., Bhat, K.H., Sharma, A.N.: Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In: 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–6. IEEE, October 2014
Kankonkar, J.T., Naik, N.: Image security using image encryption and image stitching. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), pp. 151–154. IEEE, July 2017
Krishan, K., et al.: Deep event learning boosT-up approach: DELTA. MTAP 77, 1–21 (2018)
Rohith, S., et al.: Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In: IEEE ICAECC, pp. 1–6 (2014)
Kumar, K., et al.: Economically efficient virtualization over cloud using docker containers. In: IEEE CCEM, pp. 95–100 (2016)
Kumar, K., et al.: Sentimentalizer: docker container utility over cloud. In: IEEE ICAPR, pp. 1–6 (2017)
Forouzan, A.B., et al.: Cryptography and Network Security. Tata McGraw-Hill Education (2011)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)
Chandrasekaran, K.: Essentials of Cloud Computing. CRC Press (2014)
The three ways to cloud compute. https://www.youtube.com/watch?v=SgujaIzkwrEt. Accessed Sept 2017
Virtual Machine (VM). http://searchservervirtualization.techtarget.com/definition/virtual-machine. Accessed Oct 2017
Smith, J., et al.: Virtual Machines: Versatile Platforms for Systems and Processes. Elsevier (2005)
Piyushi, M., et al.: V \(\oplus \) SEE: video secret sharing encryption technique. In: IEEE CICT, pp. 1–6 (2017)
Shikhar, S., et al.: GUESS: genetic uses in video encryption with secret sharing. In: CVIP 2017, pp. 1–6. Springer (2017)
Kumar, K., et al.: Key-lectures: keyframes extraction in video lectures. In: MISP 2017, pp. 1–7. Springer (2017)
Kumar, K., Shrimankar, D.D., Singh, N.: V-LESS: a video from linear event summaries. In: CVIP 2017, pp. 1–6 (2017)
Kumar, K., et al.: SOMES: an efficient SOM technique for event summarization in multi-view surveillance videos. In: ICACNI 2017, pp. 1–6. Springer (2017)
Krishan, K., et al.: Equal partition based clustering approach for event summarization in videos. In: The IEEE SITIS 2016, pp. 119–126 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Koppanati, R.K., Kumar, K., Qamar, S. (2021). E-MOC: An Efficient Secret Sharing Model for Multimedia on Cloud. In: Tripathi, M., Upadhyaya, S. (eds) Conference Proceedings of ICDLAIR2019. ICDLAIR 2019. Lecture Notes in Networks and Systems, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-030-67187-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-67187-7_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67186-0
Online ISBN: 978-3-030-67187-7
eBook Packages: EngineeringEngineering (R0)