The images are one of the most used kinds of the information in modern information company. Therefore actual problems is the organization of protection from unauthorized access and usage. An important characteristic of the image is the presence of contours in the image. The task of contour selection requires the use of operations on adjacent elements that are sensitive to change and suppress areas of constant levels of brightness, that is, contours are those areas where changes occur, becoming light, while other parts of the image remain dark.
Regarding image encryption, a crucial task is to implement the application of such an RSA algorithm which will provide an opportunity:
– not to decay the cryptographic stability of the RSA algorithm;
– to ensure complete noisiness of an image to prevent the application of methods of visual image processing.
Consideration is given to enhancing storage security and maintaining data access control in cloud storage. Existing ways of controlling such access are analyzed. An enhancement of the encryption technique is proposed, based on the attributes of the ciphertext policy and its application in a decentralized data access management system in multi-user cloud storage systems. The main objective is to improve the security and privacy of the management of the cloud storage for which the existing management does not meet all the necessary requirements.
Images used as a stochastic signal are among the most commonly used types of information. Accordingly, the actual task is to protect such images from unauthorized access and use. This leads to the use of known classic encryption methods in the case of image encryption. Offered algorithms of encryption-decryption are intended for the use of images in grayscale and are based on using the ideas of basic RSA algorithm. Encryption – decryption can be carried out with extra noising and without too.
Described combination of elements of the RSA algorithm and a bit-wise operations for the joint use for encryption - interpretation of images. Encryption - decryption is performed without additional noise.
Described combination of elements of the RSA algorithm and a bit-wise operations for
the joint use for encryption – interpretation of images. Encryption - decryption is performed
without additional noise.
Within investigation of AES-standard usage two software modules were implemented. These realizations include visualization tools, full implementation of algorithms for encryption and decryption according to AES standard, means for detailed logging of encryption changes to have possibilities see intermediate results data. Also application programming interface capabilities has been used to generate keys. The use of object-oriented programming allows understand the problem deeper as well as get the best way to solve it more clearly and therefore in more effective way.
Continuous increasing knowledge of auditors is very important and yet difficult task Implementation of new technologies and automation of the learning process much easier and even cheaper this task. However, the automation of the process increasing the competence of auditor entails a number of threats related to unauthorized access, damage or theft of the information contained in the system.
Proposed application of cubic fractal changes to the encryption and decryption, grayscale color using elements of the RSA algorithm.
Described combination of elements of the RSA algorithm and binary operations for the joint use for encryption - interpretation of images. Encryption - decryption is performed without additional noise.