KEYWORDS: Visualization, Data hiding, RGB color model, Steganography, Chemical elements, Information visualization, Computer security, Information security, Computing systems, Scientific research
In this paper we’ll describe new techniques of information hiding in visual containers. Presented methods will be connected with the carrier features, so secret distribution will be dependent from the content and pixel values. In traditional secret hiding solutions the way of information distribution is not dependent on the content or container’s features. Such approaches simply modify spatial or frequency parameters, without consideration of local carrier parameters. Such parameters can also determine the way of secret hiding and allow to split information over container in different manner, especially when we consider containers with different graphical features.
In this paper will be presented new opportunities for developing innovative solutions based on blockchain technologies in creation of new data management algorithms, especially those focused on the distribution and processing of data in layered structures, where independent instances can fully control and verify all operations. Later an attempt will be made to generalize protocols, which will be proposed for management activities, towards their extension and the possibility of using them in hierarchical structures. Blockchain technology should enable the development of decentralized management protocols that will allow complete verifiability of all operations by all authorized parties that can collect, process and transmit such information. In practice such protocols will give the opportunity to create an effective and secure data sharing protocols in structures, where all authorized entities are equal and can independently verify the type of operations and instances that process such data.
KEYWORDS: Clouds, Data processing, Computer security, Data analysis, Visualization, Classification systems, Fiber optic gyroscopes, Computing systems, Information security, Analytical research
In this paper will be presented new possible applications of cognitive vision or information systems for secure information distribution and management in Cloud infrastructures. Cognitive systems are dedicated to visual data interpretation and semantic analysis. Among new possibilities of application arise secure data distribution and management in distributed computer infrastructures like Cloud and Fog computing. In this paper cryptographic approaches for data division will be described, which allow to improve processes of secure and efficient information fusion with application of cognitive procedures. A few possible application of proposed approaches for visual information encryption and distribution will be also described.
In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data
splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe
new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and
cryptographic threshold schemes will be used to improve processes of secure and efficient information management with
application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data
sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information
management and encryption will be also described.
In this paper will be presented new opportunities for developing innovative solutions for semantic pattern classification
and visual cryptography, which will base on cognitive and bio-inspired approaches. Such techniques can be used for
evaluation of the meaning of analyzed patterns or encrypted information, and allow to involve such meaning into the
classification task or encryption process. It also allows using some crypto-biometric solutions to extend personalized
cryptography methodologies based on visual pattern analysis. In particular application of cognitive information systems
for semantic analysis of different patterns will be presented, and also a novel application of such systems for visual secret
sharing will be described. Visual shares for divided information can be created based on threshold procedure, which may
be dependent on personal abilities to recognize some image details visible on divided images.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.