Research on the Multilevel Security Authorization Method Based on Image Content
Journal Title: Acta Informatica Malaysia - Year 2017, Vol 1, Issue 2
Abstract
The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.
Authors and Affiliations
Tu. Chunxia
TOWARDS DEVELOPING A CLOUD-BASED EDUCATION AS A SERVICE (CEAAS) MODEL FOR CLOUD COMPUTING ADOPTION IN HIGHER EDUCATION INSTITUTIONS
This paper attempts to provides a distinctive contribution for the body of knowledge in study-ing the theoriticalmodels and factors affecting cloud computing (CC) adoption in higher educa-tion institutions (HEIs) at orga...
KNOWLEDGE GRID MODEL IN FACILITATING KNOWLEDGE SHARING AMONG BIG DATA COMMUNITY
Now days big data become one of the most interesting area in research and this study focus on the inefficiency of knowledge sharing among big data community. Moreover, it reviews current knowledge grid models and the way...
A Review on Feature based Approach in Semantic Similarity for Multiple Ontology
Measuring semantic similarity between terms is an important step in information retrieval and information integration which requires semantic content matching. Semantic similarity has attracted great concern for a long t...
Associating User’s Psychology into Quality of Service: An Example of Web Adaptation Services
Content adaptation is a potential solution for tailoring multimedia web content according to the users’ preferences and heterogeneous devices’ constraints. Content adaptation can be done as third party service over the I...
USE OF ONTOLOGY APPROACH TO STANDARDIZED SCIENTIFIC EXPERIMENTAL DATA REPRESENTATION
Scientific experimental data are rapidly produced by researchers in various research domains. It is difficult to manage and organize different experimental data because of different data sources involved. There is a need...