Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05.
DOI: 10.1109/igarss.2005.1526294
|View full text |Cite
|
Sign up to set email alerts
|

The issue on maintenance of public security for satellite images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The existing schemes [8,9] adopt authentication control mechanism to ensure the authorized access for remote sensing images. The mechanism alone is not enough to protect data which is transmitted over wireless network or internet.…”
Section: Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…The existing schemes [8,9] adopt authentication control mechanism to ensure the authorized access for remote sensing images. The mechanism alone is not enough to protect data which is transmitted over wireless network or internet.…”
Section: Securitymentioning
confidence: 99%
“…In the existing schemes [8,9], all shared files are encrypted to various different ciphertext versions according to different permission of all the uses at the head-end, and then each version is distributed to the corresponding permission users by unicast. In this proposed distribution method, after the proposed encryption processing of the original remote sensing images, only a ciphtext version is generated by content-based and region-based multi-level encryption at the head-end, and then is distributed to different permission users by multicast.…”
Section: Efficiencymentioning
confidence: 99%
See 1 more Smart Citation
“…Zhu, et al [3] focused on the principles and key technologies of mass spatial data online release system based on J2EE and gave an instance of spatial images data online browsing and release; in the paper the author pointed out that the release remote sensing images data may adopt the encryption technology but not give the corresponding theory and realization. Gee Ju Chae and Seong-Ik Cho [4] proposed the algorithm for maintenance of public security for satellite images, which mainly classify the diverse level for the diverse users. Barni, et al [5] proposed and studied the need and application of watermarking techniques for delivery of remote sensing images.…”
Section: Introductionmentioning
confidence: 99%