Research on the Multilevel Security Authorization Method Based on Image Content
Journal Title: Acta Informatica Malaysia - Year 2017, Vol 1, Issue 2
Abstract
The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.
Authors and Affiliations
Tu. Chunxia
USE OF ONTOLOGY APPROACH TO STANDARDIZED SCIENTIFIC EXPERIMENTAL DATA REPRESENTATION
Scientific experimental data are rapidly produced by researchers in various research domains. It is difficult to manage and organize different experimental data because of different data sources involved. There is a need...
WEB BASED MANAGEMENT SYSTEM FOR ENACTUS MALAYSIA NATIONAL CUP (E-EMNC)
Web Based Management System of Enactus Malaysia National Cup (E-EMNC) is event management system that specially designed for the uses of Enactus Malaysia National Cup. Without a proper event management system, Enactus Ma...
FACE RECOGNITION BY USING NEURAL NETWORK
Now a day’s security is a big issue, the whole world has been working on the face recognition techniques as face is used for the extraction of facial features. An analysis has been done of the commonly used face recognit...
CRITICAL SUCCESS FACTORS AND THEIR INFLUENCE IN ERP IMPLEMENTATION SUCCESS OF ORGANIZATIONAL PERFORMANCE
Effectiveness and efficiency of ERP execution is depending on the organization implementation. Every company that embarks on ERP execution will definitely hope that the execution will be success and effective. The concep...
TOWARD DEVELOPING A MINING OPINION MODEL: CONCEPTUAL FRAMEWORK
Opinion mining or as called sentiment analysis, its study of public opinions, attitude, emotions, sentiment towards specific issues or targets computationally. People most likely prefer to discuss and express their own o...