Yuan Ye
Schoo of Mathematics and Computer Science, Huanggang Normal University, Huanggang, 438000, Hubei, China
Tu Chunxia
Schoo of Mathematics and Computer Science, Huanggang Normal University, Huanggang, 438000, Hubei, China
Liu Xiaojun
School of Physics and Electronic Information, Huanggang Normal University, Huanggang, 438000, Hubei, China
ABSTRACT
In this study, on the basis of the characteristics of Large Quantity of Remote Sensing Data and application requirements on security, a scheme of authorizing the use of remote sensing images based on multi-level secrurity is put forward. We propose multi-region and multi-level confidential information of remote sensing images encryption algorithm based on content. The same remote sensing images after encryption are distrtbuted to different level users, such as authorized user, partly authorized user, unauthorized user, but different authorization users acquire different importmant degree information after decryption through their own decryption keys. The scheme has the high confidentiality and high computing efficiency encryption algorithm and solve the difficult problems of Large Quantity of Remote Sensing Data on security and secrecy.
PDF References Citation
How to cite this article
Yuan Ye, Tu Chunxia and Liu Xiaojun, 2013. Content-oriented Multi-level Security Authorization of Remote Sensing Images. Information Technology Journal, 12: 4687-4692.
DOI: 10.3923/itj.2013.4687.4692
URL: https://scialert.net/abstract/?doi=itj.2013.4687.4692
DOI: 10.3923/itj.2013.4687.4692
URL: https://scialert.net/abstract/?doi=itj.2013.4687.4692
REFERENCES
- Amini, M. and R. Jalili, 2010. Multi-level authorisation model and framework for distributed semantic-aware environments. IET Inform. Sec., 4: 301-321.
CrossRef - Barni, M., F. Bartolini, V. Cappellini, E. Magli and G. Olmo, 2001. Watermarking-based protection of remote sensing images: Requirements and possible solutions. Proc. SPIE, 4475: 191-202.
CrossRefDirect Link - Barni, M., F. Bartolini, E. Magli and G. Olmo, 2002. Watermarking techniques for electronic delivery of remote sensing images. Opt. Eng., 41: 2111-2119.
CrossRefDirect Link - Hsu, C.L., L.P. Chang and and T.C. Wu, 2011. A supervising authenticated encryption scheme for multilevel security. Int. J. Innovative Comput. Inform. Control, 7: 1087-1095.
Direct Link - Liu, D., 2010. A new scheme for pervasive computing-oriented dynamic multi-level security access control. Microelectr. Comput., 27: 102-105.
Direct Link - Wang, X.M., Z.Q. Guan and C.H. Wu, 2005. Information authorized hiding algorithm for remote sensing image based on image fusion. J. Remote Sensing (Chin.), 9: 576-582.
Direct Link - Wang, X.Y., H.Y. Yang and J. Wu, 2005. Content based adaptive discrete cosine transform domain watermarking algorithm for remote sensing image. Acta Geodaetica Et Cartographic Sinica, 34: 324-330.
Direct Link - Wen, J.T., M. Severa, W.J. Zeng, M.H. Luttrell and W.Y. Jin, 2002. A format-compliant configurable encryption framework for access control of video. IEEE Trans. Cir. Syst. Video Technol., 12: 545-557.
CrossRef - Wu, C.X., X. Lv and J.Q. Li, 2011. Geological data access security mechanism based on grid-GIS. Proceedings of the 19th International Conference on Geoinformatics, June 24-26, 2011, Shanghai, pp: 1-5.
CrossRef