Browse > Article
http://dx.doi.org/10.7236/JIIBC.2013.13.1.171

Image Features Based Secure Access Control for Data Content Protection  

Ha, Sunju (Dept. of Information and Communication Engineering)
Park, Daechul (Dept. of Information and Communication Engineering)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.13, no.1, 2013 , pp. 171-180 More about this Journal
Abstract
Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.
Keywords
Image password; Cloud computing; Image feature; Data security; Image-based access control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.K. Un, N.S. Jho, Y.H. Kim, D.S. Choi, "Cloud Computing Security Technology", Electronics and Telecommunications Trends, Vol.24, No.4, pp27- 31, 2009, 08.
2 C.H. Lim, "Cloud Computing Security Technology", Journal of Korea Institute of Information Security, Vol.19, No.3, pp.14-17, 2009.06
3 Ji-Soo Park, Jong-Hyuk Park, "A Study on Cloud Computing Security", Journal of Korea Information Processing Society Spring Symposium No.35, Vol.18, No.1, p.187-189, 2011.05
4 O.G. Min, H.Y. Kim, G.H. Nam, "Trends in Technology of Cloud Computing", Electronics and Telecommunications Trends, Vol.24, No.4, pp.1-13, 2009. 08
5 Choon-sik Park, "Study on Security Considerations in the Cloud Computing", Journal of academiaindustrial technology, Vol.12, No.3, pp.1408-1416, 2011.03
6 Shepard. R., 1967. Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163.   DOI   ScienceOn
7 Perrig A. and Song D., "Hash Visualization: A New Technique to Improve Real-World Security", In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce, 1999.
8 Jaehoon Sun, Kuinam J. Kim, "Cloud Computing in the Vulnerability Analysis for Personal Information Security", Journal of Information Security, Vol. 10, No.4, pp.77-82, 2010.12.
9 http://drupal.org/project/confident_captcha
10 www.mininfo.co.kr/ Dementor-SGP technical data
11 Haichang Gao et. al, , "Design and Analysis of a Graphical Password Scheme", 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 7-9, pp. 675-678, Dec 2009,
12 Qibin Sun1 et. al, "An Interactive and Secure User Authentication Scheme for Mobile Devices", IEEE International Symposium on Circuits and Systems, 2008: 18-21, pp. 2973-2976, May 2008.
13 Daechul Park, "Scalable 2-level Indexing Schemes of Large Color Image Archives Based on Color Energy Keys", Journal of Sci. Research Institution, Hannam University, Vol. 3, No.1, pp.319-332, 2002.
14 M.J. Swain and D.H. Ballard, "Color indexing," Int. Journal of Computer Vision, Vol. 7, no. 1, pp.11-32, 1991.   DOI   ScienceOn
15 G. Wolberg, "Digital Image Warping", IEEE Computer Society Press, 1990