Secret Image Digitization Over Public Cloud Through Cbtv Based Image Fusion
Sangeeta Gupta1, Ashwani Kumar2

1Sangeeta Gupta, Department of Computer Science Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, India.
2Ashwani Kumar, Department of Computer Science Engineering, Vardhaman College of Engineering, Hyderabad, India.

Manuscript received on 19 August 2019 | Revised Manuscript received on 24 August 2019 | Manuscript published on 30 August 2019 | PP: 4026-4031 | Volume-8 Issue-10, August 2019 | Retrieval Number: J99390881019/19©BEIESP | DOI: 10.35940/ijitee.J9939.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Data security in the modern world is a challenging aspect faced by common man in almost every field-either technical or non-technical. Particularly in Public Clouds where the data is openly available across the internet, customers are not much exposed to the working environment and the diverse spread of data across world wide geographic locations. Intruders attempt to misuse this data to serve their own commercial purpose. The government of India proposed NAD (National Academic Depository) which is a secure zone for people to deposit their valuable certificates rather than carrying to places. Towards this end, the goal of current work is to strengthen the security of certificates being loaded into the depositories by applying Image fusion technique through CBTV (Cloud Based Threshold Value). The proposed method gives a unique solution to prove authenticity of users by generating the secret image using image fusion technique integrated with public key infrastructure on the cloud prior to outsourcing. This is particularly useful to protect the patient health care reports to hide the disease description etc, which may otherwise have unintended consequences. The entire fusion is not disclosed at the cloud server end. The performance of the proposed approach, can be measure by calculating the robustness of the secret image (fused image) against different types of image processing attacks such as salt & pepper noise, Gaussian noise, JPEG compression, speckle noise, geometric noise etc. is calculated while stored at the cloud and effective results are achieved.
Keywords: Image Fusion, Cloud Computing, National Academic Depository, Cloud Based Threshold Value.
Scope of the Article: Cloud Computing