Fidelity and Image Protection Using Image Authentication and Access Control
碩士 === 亞洲大學 === 資訊工程學系碩士班 === 101 === Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to pro...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51589819624371849464 |
id |
ndltd-TW-101THMU0396030 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101THMU03960302016-03-23T04:13:18Z http://ndltd.ncl.edu.tw/handle/51589819624371849464 Fidelity and Image Protection Using Image Authentication and Access Control Fidelity and Image Protection Using Image Authentication and Access Control Wanutchaporn Sirakriengkrai Wanutchaporn Sirakriengkrai 碩士 亞洲大學 資訊工程學系碩士班 101 Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the Internet. In the proposed method, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Another important issue is discussed called image secret sharing. Image secret sharing is used in protecting the secret images over the Internet. Secret image is broken into several shares. And, the secret image can be reconstructed only if legal shares are collected. Access control is often used in privacy protection. The access control is used to control how a set of shares can read their own whole or partial contents of the secret image. Thus, in the second proposed scheme we proposed an image secret sharing scheme cooperating with the access control mechanism. In the proposed method, the region of the secret image is seen as a blank part if the region is not authorized. As for the first scheme, the positive data is shown for the feasibility of the image authentication. As for the second scheme, the experimental results show the feasibility to authorize the participants who can see different regions of the secret image according to the authorizations. Lin, Chih Yang 林智揚 2013 學位論文 ; thesis 29 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 亞洲大學 === 資訊工程學系碩士班 === 101 === Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the Internet. In the proposed method, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together.
Another important issue is discussed called image secret sharing. Image secret sharing is used in protecting the secret images over the Internet. Secret image is broken into several shares. And, the secret image can be reconstructed only if legal shares are collected. Access control is often used in privacy protection. The access control is used to control how a set of shares can read their own whole or partial contents of the secret image. Thus, in the second proposed scheme we proposed an image secret sharing scheme cooperating with the access control mechanism. In the proposed method, the region of the secret image is seen as a blank part if the region is not authorized. As for the first scheme, the positive data is shown for the feasibility of the image authentication. As for the second scheme, the experimental results show the feasibility to authorize the participants who can see different regions of the secret image according to the authorizations.
|
author2 |
Lin, Chih Yang |
author_facet |
Lin, Chih Yang Wanutchaporn Sirakriengkrai Wanutchaporn Sirakriengkrai |
author |
Wanutchaporn Sirakriengkrai Wanutchaporn Sirakriengkrai |
spellingShingle |
Wanutchaporn Sirakriengkrai Wanutchaporn Sirakriengkrai Fidelity and Image Protection Using Image Authentication and Access Control |
author_sort |
Wanutchaporn Sirakriengkrai |
title |
Fidelity and Image Protection Using Image Authentication and Access Control |
title_short |
Fidelity and Image Protection Using Image Authentication and Access Control |
title_full |
Fidelity and Image Protection Using Image Authentication and Access Control |
title_fullStr |
Fidelity and Image Protection Using Image Authentication and Access Control |
title_full_unstemmed |
Fidelity and Image Protection Using Image Authentication and Access Control |
title_sort |
fidelity and image protection using image authentication and access control |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/51589819624371849464 |
work_keys_str_mv |
AT wanutchapornsirakriengkrai fidelityandimageprotectionusingimageauthenticationandaccesscontrol AT wanutchapornsirakriengkrai fidelityandimageprotectionusingimageauthenticationandaccesscontrol |
_version_ |
1718210530178498560 |