Usage of Water Marking-Based Techniques for Performing Necessary Operations on a Plaintext Image in the Cloud

Prof. Sudheer Shetty,Brijesh Reddy K H
DOI: https://doi.org/10.48175/ijarsct-8610
2023-03-14
Abstract:To provide the image with security multiple encryption techniques are used. This way the image is converted to a form in which it is not read by a third party unless they have the watermark which is known to only the user. Some cryptographic protocols have been constructed, the emergence of quantum computers and quantum algorithms presents a problematic scenario for those protocols. Data-driven and Feedback-Enhanced Trust (DFET) is developed due to the multi cloud environment created by the multiple data centers. A method for quantum picture watermarking is provided to blend a grayscale quantum watermark into a quantum carrier image.Multiple image search protocols are used in which the image is searched based on their specialities. for example, Content-Based Image Retrieval (CBIR), Convolutional Neural Network (CNN). scale-invariant feature transform (SIFT) approach for encrypted images that protects privacy. PRISMA checklist in addition to a few components of the Cochrane Quality Assessment. social media and gaming applications have been widely adopted by the general public and the number of social media and gaming applications has increased, with the help of white hacking it has established a security technique, stealth robot conceals itself from the intended target/victim by using stealth tactics. Making it easier for protection.
What problem does this paper attempt to address?