z-logo
open-access-imgOpen Access
Real-Time Image Privacy Preservation using AES with Salt key and Gaussian Blur Algorithms with the application of Data Perturbation in Cloud
Author(s) -
Sidharth Kumar,
S. Devi
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.b7176.019320
Subject(s) - computer science , encryption , computer security , key (lock) , login , password , ciphertext , cloud computing , advanced encryption standard , salt (chemistry) , algorithm , operating system , chemistry
Rapid increase in image data produced by individuals and companies provoke privacy hitches such as unauthorized revelation of personal data and person’s individuality stealing, but it can be used to protect privacy of the user and also personal information. Data provider and Cloud Administrator are two types of users who have privilege and access. However, there is absence of research examining the effectiveness of implementing techniques to images as a technology that protects privacy. The Advanced Encryption Standard (AES) algorithm is selected for the login authentication process, which ensures the protection of information from unauthorized access and is proposed to create a random key generation. Data perturbation is used to add noise in databases, and Gaussian blur is done to introduce some degree of degradation in the original image. The obtained test results show that an AES with salt key can be randomly generated. In this process, security authentication is reinforced in the ciphertext changes that make up the key words for each encryption process. The result shows that the model is relatively fast with a time average of 0.034 s occupying less than 100kB of memory space.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here