JOURNAL ARTICLE

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Abstract

Because of the vast number of applications and the ambiguity in application methods, handwritten character recognition has garnered widespread recognition and increased prominence in the community of pattern recognition researchers ever since it was first developed. This is due to the fact that application methods can be quite ambiguous. Computer in the cloud, on the other hand, allows for suitable network access on demand to a shared pool of customizable computing resources and digital devices. According to those knowledgeable in the subject, the standard filtering techniques are not enough when it comes to the process of denoising images. In many different approaches to machine learning, information is lost not just during the filtering process itself but also at other points during the process. When a convolutional neural network is going through its pooling operation, the internal data representation either becomes misaligned or entirely vanishes (CNN). The reconstruction of low‐intensity digital photographs, which takes place during repetitive filtering, breaks away the artefacts that remain after each filtering function, which results in an image that is more uniform. The multilayer wavelet transform, or MLWT, is a method for processing features that comprises of many filter bands and is used in cloud computing authorization that is protected securely. In this scenario, a significant quantity of information gets obliterated from digital photographs during the process of feature extraction and processing. These issues are investigated by the deep learning algorithms that make use of autoencoder, and the methods also handle the novel windowing blocks that are being introduced to the layers. In this section, the magnitude and phase information is considered in order to construct a deep learning framework that will provide good denoising of digital images. The proposed architecture is equipped with the capability of accurately identifying, in real time, the noise level and type that was employed in the training of the network. The method that we have proposed, which is centred on the distribution of noise, may be used to determine the kind of noise. In order to categorise the various types of noise, we investigated nine distinct noise distributions. Dilated convolutional filtering will be used as the method of choice in order to ascertain the specific nature of the noise that can be found in the digital images. An autoencoder‐based deep learning algorithm is able to accomplish numerous experimental results in digital image denoising operations that are superior to those achieved by a typical deep learning algorithm even when the intensity of the scenario is low. The performance of the method that is produced by combining the autoencoder and the dilated convolutional filtering techniques is enhanced over the performance of the technology that is currently in use. Using the method that we have outlined in this study, it is possible to recreate the low‐intensity images in their entirety. We were able to show that our proposed method beat other existing algorithms for low‐density digital photos by comparing several metrics, such as the peak signal‐to‐noise ratio (PSNR), the structural similarity index, and others (SSIM).

Keywords:
Computer science Cloud computing Artificial intelligence Process (computing) Filter (signal processing) Machine learning Autoencoder Pooling Deep learning Computer vision

Metrics

11
Cited By
1.36
FWCI (Field Weighted Citation Impact)
58
Refs
0.79
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Image Processing Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Enhanced Security Model for Pervasive Computing Using Machine Learning Techniques

Jayashree AgarkhedGeetha Pawar

Journal:   Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences Year: 2021
DISSERTATION

Security Quantification and Risk-Adaptive Authorization Mechanism in Cloud Computing

Doudou Fall

University:   NAIST Digital Library (Nara Institute of Science and Technology) Year: 2015
JOURNAL ARTICLE

ENHANCE DATA SECURITY IN CLOUD COMPUTING USING MACHINE LEARNING AND HYBRID CRYPTOGRAPHY TECHNIQUES

Kiran Puttegowda

Journal:   International Journal of Advanced Research in Computer Science Year: 2017 Vol: 8 (9)Pages: 393-397
BOOK-CHAPTER

Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques

Bharati MishraDebasish Jena

Algorithms for intelligent systems Year: 2020 Pages: 525-531
JOURNAL ARTICLE

Security Techniques for Data Protection in Cloud Computing

Kire Jakimoski

Journal:   International Journal of Grid and Distributed Computing Year: 2016 Vol: 9 (1)Pages: 49-56
© 2026 ScienceGate Book Chapters — All rights reserved.