Title :
Performance of media based information leakage protection
Author :
Venktachalam, Vivek ; Park, Jae Hyo
Author_Institution :
Dept. of Comput. Sci., California State Univ., Fresno, CA, USA
Abstract :
There are many occasions that an organization needs to distribute important data to only authorized agents. However, there might happen illegal interceptions of the data by unauthorized agents. Commonly used methods of protecting information from unauthorized accesses have been based on text, but there have also appeared media based approaches in the literature. In this paper, we model and implement several combinations of the authentication systems based on the methods of using text, image and video, and evaluate their performances. In our practice, we developed 13 refined combinations of the testing models and implemented them in Java with Visual Studio as the front-end and a SQL server as the back-end. Performance analysis is done comparatively in the aspects of information protection rate and system access time delay. The experimental results revealed that the model with the combination of a text and 1 or 2 images with fine-grained access yielded the best performance with very low overheads.
Keywords :
cryptographic protocols; security of data; Java; SQL server; Visual Studio; authentication systems; illegal data interceptions; information protection rate; media based information leakage protection; system access time delay; unauthorized agents; Authentication; Computer science; Databases; Media; Servers; Testing;
Conference_Titel :
Communications, Computers and Signal Processing (PACRIM), 2013 IEEE Pacific Rim Conference on
Conference_Location :
Victoria, BC
DOI :
10.1109/PACRIM.2013.6625478