Abstract

New media art is different from ready-made art, installation art, body art, and land art. New media art is a new art subject category with “optical” media and electronic media as the basic language. And, because of the continuous development of computer networks, distributed database management systems are becoming more and more popular. This article aims to study the information security control problem in the distributed new media system. Through comprehensive access control, reliable support, and many-to-many random mutual encryption, it solves the security requirements of supporting mobile computing in a distributed network environment, communication, and hierarchical grouping. Group key management and other issues have studied some key security technologies for building secure distributed information systems. This article proposes covering the behavior-based access control model ABAC (operation-based access control model), the architecture of the new Trusted Platform Module, the architecture of multithreaded crypto chips, and their service methods, as well as distributed information systems and key management solutions. Approximately obeying the chi-square distribution with 2 degrees of freedom, when the significance level is taken as 5%, the chi-square value for the skin is 5.99. Different initial values are selected for the chaotic sequence, 200 groups of chaotic sequences with a length of 2000 are selected for sequence inspection, and the pass rate is 97.5%. It can be seen that the autocorrelation and cross-correlation characteristics of the improved spatiotemporal chaotic sequence are still relatively ideal, so the usability of the platform is relatively high.

Highlights

  • Open, and distributed mobile network, the communication network system has diverse information dissemination channels, but, in terms of politics, economy, military, and so forth, sensitive multimedia information is transmitted through open channels or public domains. e database is vulnerable to the theft of sales information and data leakage. erefore, the study of secure media encryption information becomes more and more important

  • It can be seen that the distributed multilayer application system must have a good application prospect

  • Information system development is more complicated than traditional two-tier application systems and more difficult to design

Read more

Summary

Introduction

With the development of computer technology, network communication technology, and multimedia information and processing technology, network media are widely used in education, healthcare, news, business, management, and military fields. Aiming at the comprehensive security protection requirements of multimedia information, Jiang proposed a new algorithm based on homomorphic encryption and watermarking. According to the experimental results, the sequence of watermark embedding and data encryption of the proposed algorithm does not affect the generation of the same encrypted watermark data, and the algorithm has higher security [1] His experimental process is not closed, leading to discrepancies in experimental results. E current framework for understanding and analyzing cyber threats in the field of information security (IS) is the cyber kill chain model Among these threats, specific threats that involve advanced and continuous attacks on designated targets (companies that provide multimedia services) and cause large-scale damage are called advanced persistent threats (APT). Innovation. e innovation of this article is as follows: (1) the proposed multithreaded crypto chip design plan will expand the application of cryptographic algorithms. (2) A trusted platform module is proposed to solve the problems of TPM internal sensitive information preset, backup, recovery, and so forth. (3) It provides a more comprehensive introduction to the proposed behavior-based access control model, as well as the definition of management behavior and the structure of the ABAC management model

New Media Information Encryption Technology
Sequence Randomness Test
Hierarchical Group Key Management
Load Analysis
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call