Research on the Multilevel Security Authorization Method Based on Image Content
Journal Title: Acta Informatica Malaysia - Year 2017, Vol 1, Issue 2
Abstract
The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.
Authors and Affiliations
Tu. Chunxia
A CLASSIFICATION APPROACH FOR NAÏVE BAYES OF ONLINE RETAILERS
Many small online retailers and new entrants to the online retail sector are keen to practice data mining and consumer-centric marketing in their businesses yet technically lack the necessary knowledge and expertise to d...
SPEECH RECOGNITION SYSTEMS – A COMPREHENSIVE STUDY OF CONCEPTS AND MECHANISM
Speech Recognition Systems now-a-days use many interdisciplinary technologies ranging from Pattern Recognition, Signal Processing, Natural Language Processing implementing to unified statistical framework. Such systems f...
INFRASTRUCTURE REQUIREMENTS FOR EXPERIENCE BASED FACTORY MODEL IN SOFTWARE DEVELOPMENT PROCESS IN A COLLABORATIVE ENVIRONMENT
This paper discuss the infrastructure requirement of the model named Experienced Based Facto-ry Model for Software Development Process (EBF-SD) in order to ensure the implementation of the model will be able support coll...
STUDY OF WEB PAGE RANKING ALGORITHMS: A REVIEW
Due to expanding of Web, the Information is also increasing day by day. Many users generally rely on search engine to explore the web. It is a challenge for search engine to provide relevant web page and quality informat...
EVALUATING THE COLLABORATION LEVEL AMONG PHYSICIANS IN MALAYSIAN HEALTHCARE ENVIRONMENT
This paper explains the security and privacy requirement in Business Registration System (BRS) hosted at a government institution. These requirements will be used in an improvement for the system security and privacy req...