首页> 外文OA文献 >Image Authentication and Rightful Ownership Watermarking Method for the Cloud Environment
【2h】

Image Authentication and Rightful Ownership Watermarking Method for the Cloud Environment

机译:云环境下的图像认证与合法所有权水印方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Cloud computing has evolved in the last five years from being an abstract idea and proposal, and into services that people use every day. In particular services that relate to mobile phone technologies have expanded in proportion to the number of users, so that for example the use of cloud drop boxes for photos, videos, and audio recordings is done on a daily basis. In the bigger picture businesses have found it economical to exploit the new opportunities and to migrate much of their previous business computing capability and storage facilities into the cloud.With opportunity there always comes the positive and negative aspects of risk. With cloud computing the economic advantages and the ease of access have outweighed the risk of unplanned information disclosure. Cloud computing spans a multitude of technologies, is multi-layered, and crosses the boundaries of different legal jurisdictions. As a consequence it is possible for an end user to commit their information and/or the information processing into cloud services with a trusted supplier. However, the cloud service supplier interacts with many other service suppliers who may not share the same legal compliance or understanding of the service level agreements. The complication of service agreements also extends to the ability of anyone service level agreement to adequately protect digital property rights.In this thesis the problem of rightful ownership is raised and research questions developed to explore the potential positive and negative risks around property ownership in the cloud. The three research questions are asked:•What preparation methods improve ownership protection in cloud environments?•What could be a suitable management framework to increase ownership protection in a cloud environment?•What tests show the reliability of a proposed method in a cloud environment?The literature analysis identified both watermarking and watermarking technologies as being relevant to the key issue of privacy protection. Consequently the researcher chose to build a watermarking application and to introduce unique security features and implementation schema as a working solution to the problem.A design science approach is adopted as being relevant to an exploratory investigation and the development of software artefacts that are open to revision and continuous improvement. The researcher builds a watermarking software artefact (see Appendix B for the code, and chapter 4 for the demonstration) and submits to industry experts for naturalistic feedback. Comprehensive statistical analysis is also performed on the artefact to know and to understand the value of the implementation. It was found that this particular solution to the rightful ownership problem is a working solution that can be further developed in theory and in practice. The significant innovation proposed in this thesis is that the service supplier takes responsibility for watermarking all objects submitted to the cloud in the interests of standardisation, performance, and security of information in the cloud.The nature and approach of this research has been to address the theoretical problem by reasoning and then to deliver a solution by demonstrating a relevant software artefact. The software artefact for watermarking has performed well and passed naturalistic scrutiny but it requires further development and maturity before it can be generalised across the Cloud services industry. The suggestions for further research arising from this thesis are:•examination of watermarking potential for all information submitted to the cloud•further research and intellectual property protection in the Cloud•further exploration of industry sector specific requirements for watermarking•the development of policies and law that applies to ownership issues in the cloud•standardisation procedures for all cloud service suppliers•the availability of watermarking tools on every cloud service suppliers site
机译:在过去的五年中,云计算已经从一个抽象的想法和提议发展成为人们每天使用的服务。特别地,与移动电话技术有关的服务已与用户数量成比例地扩展,从而例如每天都使用云投寄箱来存储照片,视频和音频记录。从更大的角度来看,企业发现利用新机会并将其以前的许多业务计算功能和存储设施迁移到云中是经济的。机会总是带来正面和负面的风险。利用云计算,经济优势和易于访问已超过了计划外信息泄露的风险。云计算跨越多种技术,是多层的,并且跨越了不同法律管辖区的边界。结果,最终用户有可能与受信任的供应商将他们的信息和/或信息处理提交到云服务中。但是,云服务提供商与许多其他服务提供商进行交互,这些服务提供商可能没有相同的法律合规性或对服务级别协议的理解。服务协议的复杂性还扩展到了任何服务级别协议充分保护数字产权的能力。本文提出了合法所有权问题,并提出了研究问题以探讨云中财产所有权的潜在正负风险。提出以下三个研究问题:•哪些准备方法可以改善云环境中的所有权保护?•什么样的管理框架可以提高云环境中的所有权保护?•哪些测试可以证明所提出方法在云环境中的可靠性?文献分析表明,水印和水印技术均与隐私保护的关键问题相关。因此,研究人员选择构建水印应用程序,并引入独特的安全功能和实现方案作为对该问题的有效解决方案。采用了一种设计科学方法,该方法与探索性研究和可修改的软件构件的开发有关和持续改进。研究人员构建了一个水印软件产品(代码请参见附录B,演示请参见第4章),并提交给行业专家以获取自然反馈。还对工件进行了全面的统计分析,以了解和了解实施的价值。人们发现,对合法所有权问题的这种特定解决方案是一种可以在理论和实践上进一步发展的可行解决方案。本论文提出的一项重大创新是,服务提供商负责为云中提交的所有对象加水印,以实现云中信息的标准化,性能和安全性。本研究的性质和方法一直致力于解决通过推理理论问题,然后通过演示相关软件伪像来提供解决方案。用于水印的软件人工制品性能良好,并经过了自然主义的审查,但在将其推广到整个云服务行业之前,还需要进一步开发和成熟。本文提出的进一步研究建议包括:•检查提交给云的所有信息的水印潜力•云中的进一步研究和知识产权保护•进一步探索行业部门对水印的特定要求•政策和法律的发展适用于云中的所有权问题•所有云服务提供商的标准化程序•每个云服务提供商站点上水印工具的可用性

著录项

  • 作者

    Khaleghparast Reza;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号