Backwards Compatible, Multi-Level Regions-of-Interest (ROI) Image Encryption Architecture with Biometric Authentication
نویسندگان
چکیده
Digital image archival and distribution systems are an indispensable part of the modern digital age. Organizations perceive a need for increased information security. However, conventional image encryption methods are not versatile enough to meet more advanced image security demands. We propose a universal multi-level ROI image encryption architecture that is based on biometric data. The proposed architecture ensures that different users can only view certain parts of an image based on their level of authority. Biometric authentication is used to ensure that only an authorized individual can view the encrypted image content. The architecture is designed such that it can be applied to any existing raster image format while maintaining full backwards compatibility so that images can be viewed using popular image viewers. Experimental results demonstrate the effectiveness of this architecture in providing conditional content access.
منابع مشابه
Intelligent Multi-Level Regions-of-Interest (ROI) Document Image Encryption Using an Online Learning Model
Image-based document management systems have become increasingly popular for handling documents that contain both text and graphical elements. When such systems are used to store confidential information, document security is a key concern. Conventional encryption techniques used for images fail to provide the level of flexibility required by such document management systems. Newer image encryp...
متن کاملA new hybrid fuzzy biometric-based image authentication model
Watermarking is one of the most known techniques for authentication, tampering detection, privacy control, etc. Concerning privacy protection of patients’ medical records, efforts have been devoted to guarantee the confidentiality of data and medical images during storage and transmission via an untrustworthy channel. Our developed watermarking system, aims at fulfilling such demands through th...
متن کاملUsing Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastructure. When the user authentication procedure involves personal devices, the Multi Agent System model helps in the distribution of data and algorithms thanks to a better partitioning of roles and responsibilities, enh...
متن کاملReal-Time Finger-Vein Recognition System
As the need for personal authentication increases, many people are turning to biometric authentication as an alternative to traditional security devices. Concurrently, users and vendors of biometric authentication systems are searching for methods to establish system performance. However, most existing biometric systems have high complexity in time or space or both. In this paper, we propose a ...
متن کاملSalient Region Detection for Biometric Watermarking
Visual saliency, namely the perceptual significance to human vision system (HVS), is a quality that differentiates an object from its neighbors. Detection of salient regions which contain prominent features and represent main contents of the visual scene, has obtained wide utilization among computer vision based applications, such as object tracking and classification, region-of-interest (ROI) ...
متن کامل