z-logo
open-access-imgOpen Access
Research On The Multilevel Security Authorization Method Based On Image Content
Author(s) -
Chunxia Tu
Publication year - 2017
Publication title -
acta informatica malaysia
Language(s) - English
Resource type - Journals
eISSN - 2521-0874
pISSN - 2521-0505
DOI - 10.26480/aim.02.2017.17.19
Subject(s) - authorization , image (mathematics) , computer science , content (measure theory) , computer vision , computer security , mathematics , mathematical analysis
The technology of digital watermarking and information hidden of image cannot solve the security problem of confidential regional data, and thus the research of the high-performance encryption technology of confidential data of Large Quantity of image has a important theoretical value and practical significance.In this paper, on the basis of the characteristics of Large Quantity of Image and application requirements on security, a scheme of authorizing the use of image based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of image encryption algorithm based on content. The same images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Image on security and secrecy.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom