Fidelity and Image Protection Using Image Authentication and Access Control

碩士 === 亞洲大學 === 資訊工程學系碩士班 === 101 === Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to pro...

Full description

Bibliographic Details
Main Author: Wanutchaporn Sirakriengkrai
Other Authors: Lin, Chih Yang
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/51589819624371849464
id ndltd-TW-101THMU0396030
record_format oai_dc
spelling ndltd-TW-101THMU03960302016-03-23T04:13:18Z http://ndltd.ncl.edu.tw/handle/51589819624371849464 Fidelity and Image Protection Using Image Authentication and Access Control Fidelity and Image Protection Using Image Authentication and Access Control Wanutchaporn Sirakriengkrai Wanutchaporn Sirakriengkrai 碩士 亞洲大學 資訊工程學系碩士班 101 Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the Internet. In the proposed method, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Another important issue is discussed called image secret sharing. Image secret sharing is used in protecting the secret images over the Internet. Secret image is broken into several shares. And, the secret image can be reconstructed only if legal shares are collected. Access control is often used in privacy protection. The access control is used to control how a set of shares can read their own whole or partial contents of the secret image. Thus, in the second proposed scheme we proposed an image secret sharing scheme cooperating with the access control mechanism. In the proposed method, the region of the secret image is seen as a blank part if the region is not authorized. As for the first scheme, the positive data is shown for the feasibility of the image authentication. As for the second scheme, the experimental results show the feasibility to authorize the participants who can see different regions of the secret image according to the authorizations. Lin, Chih Yang 林智揚 2013 學位論文 ; thesis 29 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 亞洲大學 === 資訊工程學系碩士班 === 101 === Nowadays, Authentication mechanism is widely applied to digital images. In this thesis, two schemes for image protection are proposed. In the first one, we propose a self-authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the Internet. In the proposed method, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. Another important issue is discussed called image secret sharing. Image secret sharing is used in protecting the secret images over the Internet. Secret image is broken into several shares. And, the secret image can be reconstructed only if legal shares are collected. Access control is often used in privacy protection. The access control is used to control how a set of shares can read their own whole or partial contents of the secret image. Thus, in the second proposed scheme we proposed an image secret sharing scheme cooperating with the access control mechanism. In the proposed method, the region of the secret image is seen as a blank part if the region is not authorized. As for the first scheme, the positive data is shown for the feasibility of the image authentication. As for the second scheme, the experimental results show the feasibility to authorize the participants who can see different regions of the secret image according to the authorizations.
author2 Lin, Chih Yang
author_facet Lin, Chih Yang
Wanutchaporn Sirakriengkrai
Wanutchaporn Sirakriengkrai
author Wanutchaporn Sirakriengkrai
Wanutchaporn Sirakriengkrai
spellingShingle Wanutchaporn Sirakriengkrai
Wanutchaporn Sirakriengkrai
Fidelity and Image Protection Using Image Authentication and Access Control
author_sort Wanutchaporn Sirakriengkrai
title Fidelity and Image Protection Using Image Authentication and Access Control
title_short Fidelity and Image Protection Using Image Authentication and Access Control
title_full Fidelity and Image Protection Using Image Authentication and Access Control
title_fullStr Fidelity and Image Protection Using Image Authentication and Access Control
title_full_unstemmed Fidelity and Image Protection Using Image Authentication and Access Control
title_sort fidelity and image protection using image authentication and access control
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/51589819624371849464
work_keys_str_mv AT wanutchapornsirakriengkrai fidelityandimageprotectionusingimageauthenticationandaccesscontrol
AT wanutchapornsirakriengkrai fidelityandimageprotectionusingimageauthenticationandaccesscontrol
_version_ 1718210530178498560