“…First, some studies focus on controlling subjects (users, etc.) such as Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) (Bertino, 2003;Ferraiolo and Kuhn, 1992;Kuhn et al, 2010;Sandhu et al, 1996;2000;United Nations, 2004), while some are about the expansion of such methods (Bertino et al, 2005;Kalinin et al, 2018;Sinha et al, 2018;Zhao and Chen, 2013) Second, techniques such as masking (Mansfield-Devine, 2014), digital watermarking (Kumar, 2019), image fusion (Gupta and Kumar, 2019) and encryption (Davida et al, 1981;Elovici et al, 2004) are aiming at strengthening the security of objects such as data. Third, those that consider both subjects and objects include Mandatory Access Control (MAC).…”