📞 +91-7667918914 | ✉️ iarjset@gmail.com
International Advanced Research Journal in Science, Engineering and Technology
International Advanced Research Journal in Science, Engineering and Technology A Monthly Peer-Reviewed Multidisciplinary Journal
ISSN Online 2393-8021ISSN Print 2394-1588Since 2014
IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.
← Back to VOLUME 11, ISSUE 5, MAY 2024

WATERMARKING AND RE-ENCRYPTION APPROACH TO AVOID DATA LEAKAGE

Shalini A, Biju Balakrishnan

👁 3 views📥 0 downloads
Share: 𝕏 f in

Abstract: Sharing multimedia data is becoming a more and more necessary component of daily life for users to access various systems, services, and applications. with the actual world, data exposure happens often with cloud storage services. In safe data transfer medium, authentication and copyright protection of multimedia materials have long been issues. utilization of modern technology and the Internet, the problem has gotten worse. Making copyright protection is more challenging and complex, though. The copyright protection issue has a solution: digital watermarking. Both watermarking and the Proxy Re-encryption (PRE) methodology are employed in the suggested method for effective sharing of multimedia material. In digital material like photographs, watermarking is used to conceal information like secret information. Data security is achieved using encryption methods. In order to prevent unauthorised access, information is encoded using encryption, making it impossible for anyone who are not authorised to view it. In the proposed approach, a key may be used to encrypt a secret key using an encryption method. The user's private key may then be integrated into the picture using LSB (Least Significant Bit), along with encrypted key information. Images may be encrypted using the ECC Encryption technique once secret information has been included. With the aid of the inbuilt data verification procedure, the decryption key may finally be extracted by an authorised user. When user Data does not correspond embedded information, illegal or unauthorised access can be recognised.

How to Cite:

[1] Shalini A, Biju Balakrishnan, “WATERMARKING AND RE-ENCRYPTION APPROACH TO AVOID DATA LEAKAGE,” International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2024.115110

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.