Securing Images in Cloud using Hyper Chaos with User Authentication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing user Authentication Through Customized X.509 in Cloud Computing

Cloud computing, a highly flexible and user friendly technology of the era providing benefits like accessibility, scalability, reliability and cost effeteness but on the other hand many security and privacy issues arises with the rapid increase of users. Weak authentication process is one of the biggest problem towards breach and most of the time it happened when credentials openly travel over ...

متن کامل

Securing the Information Using Hyper-chaos Encryption Algorithm

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...

متن کامل

User Authentication Platform using Provisioning in Cloud Computing Environment

Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper ...

متن کامل

Securing Data on the Cloud Server by the User Authentication and Data Security Techniques

Cloud computing is a model which offers a large number of applications under the different topologies. It is the technology of building a strong data security between the Cloud Service Provider (CSP) and User. Authentication is a direct need of an each and every organization and so it is becoming supreme necessary for an organization not because it copes only with the security threats but the r...

متن کامل

Preserving User Privacy with Anonymous Authentication in Cloud Computing

Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2015

ISSN: 0975-8887

DOI: 10.5120/21632-4951