Advertisement

A Secure Digital Watermark Skeleton Based on Cloud Computing Web Services

  • Jian Zhang
  • Ding Yi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)

Abstract

More and more digital watermark systems provide the services via the internet. The watermark embedding and detection technology components are the parts of the web services of the sites. This paper designs a secure digital watermark skeleton based on cloud computing, pushing these web services to the cloud. The entire skeleton is based on cloud computing architecture, including service delivery, data storage and security, data lifetime, etc. The skeleton combines the digital watermark and cloud computing technologies with the certain reference value, it also provides efficient digital watermark within the large number of complicating requests to protect digital products in the marketing of multimedia network environment.

Keywords

Digital watermark Cloud computing Web service 

References

  1. 1.
    Hu W, Tong C, Chen D, Li Z, Kou W (2004) Secure digital watermark scheme based on web services. J Zhejiang Univ (Eng Sci) 38(11):1441–1445. Zhejiang University, HangzhouGoogle Scholar
  2. 2.
    Zhang J (2011) A web services-based security model for digital watermarking. In: 2011 international conference on multimedia technology (ICMT 2011), pp 4805–4808. IEEE press, New JerseyGoogle Scholar
  3. 3.
    Booth D, Haas H, McCabe F, Newcomer E, Champion M, Ferris C, Orchard D (2011) Web services architecture. http://www.w3.org/TR/ws-arch/, 6 Jun 2011
  4. 4.
    Atkinson B, Della G, Hada S (2002) Specification: web services security (WS-Security). http://www-106.ibm.com/developerworks/library/ws2secure/, 4 May 2002
  5. 5.
    Huawei Technologies Co., Ltd (2009) Huawei A&S cloud computing solutions. In: Huawei technical reportGoogle Scholar
  6. 6.
    Wei R, Linchen Y, Ren G, Feng X (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16(5):520–528. Tsinghua University, BeijingGoogle Scholar
  7. 7.
    Dapeng Z, Ke C, Min Z, Zhen X (2011) The research of cloud computing data security support platform architecture. J Comput Res Dev 48(Suppl):261–267. Institute of Computing Technology, BeijingGoogle Scholar
  8. 8.
    Fengzhe Z, Jin C, Haibo C, Binyu Z (2011) Lifetime privacy and self-destruction of data in the cloud. J Comput Res Dev 48(7):1155—1167. Institute of Computing Technology, BeijingGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.School of Computer EngineeringShenzhen PolytechnicShenzhenChina

Personalised recommendations