RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practica...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Zibeline International
2017-11-01
|
Series: | Acta Informatica Malaysia |
Subjects: | |
Online Access: | https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdf |
id |
doaj-0f1b9145e0024ab4869e7ffa571f16f8 |
---|---|
record_format |
Article |
spelling |
doaj-0f1b9145e0024ab4869e7ffa571f16f82020-11-24T22:16:36ZengZibeline InternationalActa Informatica Malaysia2521-08742521-05052017-11-0112171910.26480/aim.02.2017.17.19RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENTTu. ChunxiaThe technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy. https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdfimagesmulti-region selectionmultilevel encryptionmulti-level authorization based on content |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tu. Chunxia |
spellingShingle |
Tu. Chunxia RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT Acta Informatica Malaysia images multi-region selection multilevel encryption multi-level authorization based on content |
author_facet |
Tu. Chunxia |
author_sort |
Tu. Chunxia |
title |
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT |
title_short |
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT |
title_full |
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT |
title_fullStr |
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT |
title_full_unstemmed |
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT |
title_sort |
research on the multilevel security authorization method based on image content |
publisher |
Zibeline International |
series |
Acta Informatica Malaysia |
issn |
2521-0874 2521-0505 |
publishDate |
2017-11-01 |
description |
The technology of digital watermarking and information hidden of image cannot solve the security problem of
confidential regional data, and thus the research of the high-performance encryption technology of confidential data
of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of
the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing
the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential
information of image encryption algorithm based on content. The same images after encryption are distrtbuted to
different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization
users acquire different importmant degree information after decryption through their own decryption keys. The
scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult
problems of Large Quantity of Image on security and secrecy. |
topic |
images multi-region selection multilevel encryption multi-level authorization based on content |
url |
https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdf |
work_keys_str_mv |
AT tuchunxia researchonthemultilevelsecurityauthorizationmethodbasedonimagecontent |
_version_ |
1725788809404088320 |