2019
DOI: 10.4018/ijcac.2019070102
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection

Abstract: Nowadays, the use of digital content or digital media is increasing day by day. Therefore, there is a need to protect the digital document from both unauthorized users and authorized users. The digital document should be protected from authorized users who try to redistribute it illegally. Digital watermarking techniques along with cryptography are insufficient to ensure an adequate level of security of digital media. The security of the transferring digital data in the modern world is also a big challenge bec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 46 publications
(13 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…Due to the growing demand for automatic interpretation of human action, action recognition has caught the attention in both academia and industry [16]. Analyzing and understanding a person's action in a video is necessary for a wide range of applications, such as web video classification [17], assisting the visually impaired [8], surveillance and security.…”
Section: Action Recognitionmentioning
confidence: 99%
“…Due to the growing demand for automatic interpretation of human action, action recognition has caught the attention in both academia and industry [16]. Analyzing and understanding a person's action in a video is necessary for a wide range of applications, such as web video classification [17], assisting the visually impaired [8], surveillance and security.…”
Section: Action Recognitionmentioning
confidence: 99%
“…In fast RCNN, Ren et al [12] has used 16 architectures in convolution layers to achieve detection and classification accuracy on datasets. Kumar et al [30][31][32] proposed a method to detect the objects with audio device in real time for blind people using deep neural network. Figure 1 demonstrates the architecture of Faster RCNN.…”
Section: Faster Rcnnmentioning
confidence: 99%
“…[5], [6]. Kumar et al [7][8][9][10][11][12] proposed different buyer seller watermarking protocol to provide secure and private transaction between the communicating parties.In general the benefits of the cloud are in the form of revolution, different serious issues and challenges are reported by cloud computing [13], [14]. These issues are connectivity and fault-tolerance capability adequate security etc [15].…”
Section: Related Workmentioning
confidence: 99%