RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT

The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practica...

Full description

Bibliographic Details
Main Author: Tu. Chunxia
Format: Article
Language:English
Published: Zibeline International 2017-11-01
Series:Acta Informatica Malaysia
Subjects:
Online Access:https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdf
id doaj-0f1b9145e0024ab4869e7ffa571f16f8
record_format Article
spelling doaj-0f1b9145e0024ab4869e7ffa571f16f82020-11-24T22:16:36ZengZibeline InternationalActa Informatica Malaysia2521-08742521-05052017-11-0112171910.26480/aim.02.2017.17.19RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENTTu. ChunxiaThe technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy. https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdfimagesmulti-region selectionmultilevel encryptionmulti-level authorization based on content
collection DOAJ
language English
format Article
sources DOAJ
author Tu. Chunxia
spellingShingle Tu. Chunxia
RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
Acta Informatica Malaysia
images
multi-region selection
multilevel encryption
multi-level authorization based on content
author_facet Tu. Chunxia
author_sort Tu. Chunxia
title RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
title_short RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
title_full RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
title_fullStr RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
title_full_unstemmed RESEARCH ON THE MULTILEVEL SECURITY AUTHORIZATION METHOD BASED ON IMAGE CONTENT
title_sort research on the multilevel security authorization method based on image content
publisher Zibeline International
series Acta Informatica Malaysia
issn 2521-0874
2521-0505
publishDate 2017-11-01
description The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.
topic images
multi-region selection
multilevel encryption
multi-level authorization based on content
url https://actainformaticamalaysia.com/archives/AIM/2aim2017/2aim2017-17-19.pdf
work_keys_str_mv AT tuchunxia researchonthemultilevelsecurityauthorizationmethodbasedonimagecontent
_version_ 1725788809404088320