Font Size: a A A

Research Of Image Watermarking Technology In Mobile Terminal Based On Cloud Platform

Posted on:2015-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:J L XiaoFull Text:PDF
GTID:2298330467981203Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Rapid popularization of mobile terminals promotes a large number of mobile applications to appear, information security become more and more serious. Today, People can use mobile phone to take pictures and upload to social networking anywhere.But it is difficult to guarantee the information safety and the source of the information is true and reliable. At the same time, cloud computing and mobile terminal are combined with a tendency. there are many peculiarities of the mobile terminal information security problems and countermeasures in the cloud environment. This paper construct a system of the mobile phone upload picture to the cloud platform in order to study the Image watermarking aiming at photos and information security technology when mobile terminals interacting with the cloud platform.Firstly, a private cloud platform was builded based on open source cloud computing technology Openstack for internal use. The platform allows users to customize the infrastructure according to their needs. it is easy to expand the size of cluster and deploy the watermarks applications to the cloud platform. It provides a good test environment and users can visit the virtual machines through web interface mode. Secondly, an image watermarking system against mobile phone photograph was designed. This system improved the traditional DCT watermarking algorithm, while the watermark information is embedded into vector image in the form of QR images. It is greatly to enhance the robustness of watermarking algorithm and watermark data capacity. Finally, this paper proposed a information security solution base on the image watermarking system. The purpose of the program is to guarantee information security in the process from mobile terminal to upload to the cloud platform. This program achieve application level access control through android access machanism, achieve the identity of users to access cloud platforms relying on Keystone, achieve the integrity authentication by the way of calculating the message digest before information uploading, achieve data encryption in the message transmission, achieve picture traceable by digital watermark technology. The entire program improve the security of information effectively throuth reaching five information security service requirements including the authentication, data confidentiality, access control, data integrity and non-repudiation.
Keywords/Search Tags:Cloud Computing, Openstack, Mobile Terminals, ImageWatermarking, Information Security
PDF Full Text Request
Related items