There are many occasions that an organization needs to distribute important data to only authorized agents. However, there might happen illegal interceptions of the data by unauthorized agents. Commonly used methods of protecting information from unauthorized accesses have been based on text, but there have also appeared media based approaches in the literature. In this paper, we model and implement several combinations of the authentication systems based on the methods of using text, image and video, and evaluate their performances. In our practice, we developed 13 refined combinations of the testing models and implemented them in Java with Visual Studio as the front-end and a SQL server as the back-end. Performance analysis is done comparatively in the aspects of information protection rate and system access time delay. The experimental results revealed that the model with the combination of a text and 1 or 2 images with fine-grained access yielded the best performance with very low overheads.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.