Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.12 Issue.3

Submission
Last date
28-Jun-2026
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-12,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment
PaperId: :  6201
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 4 2017
DUI:    16.0415/IJARIIE-6201
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Sonal H. KunteGokhale Education Society’s, R. H. Sapat College of Engineering, Management Studies and Research, Savitribai phule pune university, Nashik - 422 005, (M.S.), INDIA
Shivaji R.LahaneGokhale Education Society’s, R. H. Sapat College of Engineering, Management Studies and Research, Savitribai phule pune university, Nashik - 422 005, (M.S.), INDIA

Abstract

Computer Engineering
Content-based image retrieval, copy-deterrence, Watermark certification authority, trapdoor, Secure kNN, feature vectors, watermark.
Content-based image retrieval (CBIR) [1] are easy to manipulate and edit due to availability of powerful image processing and cloud computing environment. Searchable encryption (SE) scheme [11] allows image users to search over encrypted data collection. Nowadays, it is possible to do retrieval with preserving privacy [2] by encrypting it before outsourcing [5] and with copy-deterrence [3] so that unauthorized image users will not get access to it. Also tried to increase robustness of CBIR. Watermark certification authority (WCA) is a trusted agency who generate watermark-based protocol [4] for copy deterrence to avoid illegal distribution. Generating a unique watermark and directly Embedding it into the encrypted images by the cloud server before images are sent to the query user is one of the critical challenge WCA. The image integrity verification as well as generating trapdoor for retrieval in this environment is now days becoming the challenging for image users. Secure kNN algorithm [12] is used to protect feature vectors [2] (SCD, CSD, CLD, EHD) which are used to represent corresponding images. Recently hashing algorithm, auditing and alert generation are used at image users’ side for verification purpose.Firstly, Zhangs’ algorithm was used for encryption, decryption and generating watermark-based images. But now-a-days, watermark-based protocol is used, which improve robustness.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Sonal H. Kunte, and Shivaji R.Lahane. "Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment" International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 4 2017 Page 1853-1860
MLA Sonal H. Kunte, and Shivaji R.Lahane. "Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment." International Journal Of Advance Research And Innovative Ideas In Education 3.4(2017) : 1853-1860.
APA Sonal H. Kunte, & Shivaji R.Lahane. (2017). Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment. International Journal Of Advance Research And Innovative Ideas In Education, 3(4), 1853-1860.
Chicago Sonal H. Kunte, and Shivaji R.Lahane. "Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 4 (2017) : 1853-1860.
Oxford Sonal H. Kunte, and Shivaji R.Lahane. 'Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 4, 2017, p. 1853-1860. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/Using_Watermark_Based_Protocol__Increase_Robustness_and_Privacy_of_Content_Based_Image_Retrieval_in_Cloud_Computing_Environment_ijariie6201.pdf (Accessed : 20 February 2019).
Harvard Sonal H. Kunte, and Shivaji R.Lahane. (2017) 'Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment', International Journal Of Advance Research And Innovative Ideas In Education, 3(4), pp. 1853-1860IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/Using_Watermark_Based_Protocol__Increase_Robustness_and_Privacy_of_Content_Based_Image_Retrieval_in_Cloud_Computing_Environment_ijariie6201.pdf (Accessed : 20 February 2019)
IEEE Sonal H. Kunte, and Shivaji R.Lahane, "Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 4, pp. 1853-1860, Jul-Aug 2017. [Online]. Available: http://ijariie.com/AdminUploadPdf/Using_Watermark_Based_Protocol__Increase_Robustness_and_Privacy_of_Content_Based_Image_Retrieval_in_Cloud_Computing_Environment_ijariie6201.pdf [Accessed : 20 February 2019].
Turabian Sonal H. Kunte, and Shivaji R.Lahane. "Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 4 (20 February 2019).
Vancouver Sonal H. Kunte, and Shivaji R.Lahane. Using Watermark-Based Protocol, Increase Robustness and Privacy of Content-Based Image Retrieval in Cloud Computing Environment. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : 20 February 2019]; 3(4) : 1853-1860. Available from: http://ijariie.com/AdminUploadPdf/Using_Watermark_Based_Protocol__Increase_Robustness_and_Privacy_of_Content_Based_Image_Retrieval_in_Cloud_Computing_Environment_ijariie6201.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 2/20/2019 11:42:47 PM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Machine Learning Based Early Stage Diabetes Detection SystemComputer EngineeringRohan Mulik Download
A Survey on Skillsense:AI Career Analyzer AppComputer EngineeringKirti Datir Download
Employee Performance PortalComputer science and engineeringP.Harika Download
STATE AWARE MULTI-HOP ROUTING VIA DIGITAL TWIN FOR IOT NETWORKSINTERNET OF THINGS (WSN)PATEL NENSI RAKESHBHAI Download
Soil Quality Assessment Using Machine Learning & IoTComputer EngineeringKiran D Kshirsagar Download
Unsupervised Contribution-Oriented Learning Model for Social Influence DetectionComputer EngineeringSnehal Mahjaan Download
DESIGN AND IMPLEMENTATION OF A BLUETOOTH-CONTROLLED ROBOTIC CAR USING ARDUINOComputer Mr. Swapnil Sanjay Bafana Download
AI-DRIVEN DEEPFAKE IDENTIFICATION IN REAL TIMEComputer EngineeringPavan Gajanan Bhonde Download
RESQ-BOTComputer Engineering Tiparkar Prathamesh Navnath Download
A Critical Review and Modern Contextualization of the 2009 Distributed Real-Time Computer Network Architecture (DRNA)Computer EngineeringNandishwar EN Download
Block-Chain Based Document Verification System using IPFSComputer EngineeringAkash Santosh Devade Download
A COMPREHENSIVE REVIEW OF DUAL FEATURE-BASED INTRUSION DETECTION SYSTEM FOR IoT NETWORK SECURITYComputer Science and EngineeringShrinidhi Hegde Download
Civica AI: A Politician-Centric Grievance Redressal and Service DirectoryComputer EngineeringKaranjule Dhanashri Bhausaheb Download
A Deep Learning Framework for Mood-Based Music Recommendation via Facial Expression AnalysisComputer Vaibhav Ashok Bhangare Download
GREEN NETWORKING: ENERGY-EFFICIENT PROTOCOLS AND SUSTAINABLE NETWORK DESIGN: A COMPREHENSIVE REVIEWComputer Science and EngineeringPradeep Nayak Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2026. IJARIIE. All Rights Reserved.