Journal of Geo-information Science >
A Multi-level Authentication Authorization Approach for Remote Sensing Image
Received date: 2014-06-30
Request revised date: 2014-11-23
Online published: 2015-01-05
Copyright
Integrity authentication is proved to be the prerequisite of remote sensing image applications. In other words, an image with poor integrity would have little value in further utilizations. The special nature of the authentication process is not taken into account in conventional authentication technologies, which makes it difficult for all users to be authorized to discriminate whether the images have been destabilized. Moreover, traditional authentication technologies are based on the binary data, which can not meet the requirements of content authentication for remote sensing image. According to the actual requirements of remote sensing image authentication, a multi-level authorization method for remote sensing image based on perceptual hashing and one-way function is proposed from the perspective of content authentication. Perceptual hash technology is different from the cryptographic hash function, that it can express the content of remote sensing image with little information, at the same time, it can keep the robustness for operations that do not change the content of image. Multi-level authorization management is realized by establishing a key vector corresponding to the permission vector. So the higher privileged users can calculate the keys of users with lower priorities, based on their own keys. First, the key vector was produced for multi-level authorization management based on one-way function. Second, the image is partitioned into regions with different sensitivity levels according to the contained objects. Then, the perceptual hash values of the regions are generated and used for authentication, and are encrypted with hierarchical keys. Users with different priorities can authenticate the corresponding contents with relevant sensitivity levels from the remote sensing image, after decrypting the perceptual hash values. The experiment results show that the proposed approach effectively achieved the multi-level authentication for remote sensing images with high computing efficiency and confidentiality.
DING Kaimeng , ZHU Changqing . A Multi-level Authentication Authorization Approach for Remote Sensing Image[J]. Journal of Geo-information Science, 2015 , 17(1) : 8 -14 . DOI: 10.3724/SP.J.1047.2015.00008
Fig. 1 The authority management model for image authentication图1 影像认证权限管理模型 |
Fig. 2 The general process of perceptual hashing图2 感知哈希的一般生成流程 |
Fig. 3 The experiment image图3 实验遥感影像 |
Fig. 4 Grid division and sensitive region classification图4 影像格网划分及敏感区域划分 |
Fig. 5 Tamper examples of the sensitive regions图5 影像敏感区域篡改示例 |
Fig. 6 Authentication results for different users with different authorities图6 不同认证权限用户的认证结果 |
Fig. 7 Robustness test图7 鲁棒性测试 |
The authors have declared that no competing interests exist.
[1] |
|
[2] |
|
[3] |
|
[4] |
|
[5] |
|
[6] |
|
[7] |
|
[8] |
|
[9] |
|
[10] |
|
[11] |
|
[12] |
|
[13] |
|
[14] |
|
[15] |
|
[16] |
|
[17] |
|
[18] |
|
[19] |
|
[20] |
|
[21] |
|
[22] |
|
/
〈 | 〉 |