Authentication With Distortion Criteria

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Authentication With Distortion Constraints

In many multimedia applications, there is a need to authenticate sources subjected to benign degradations such as noise, compression, etc., in addition to potential tampering attacks. Authentication can be enabled through the embedding of suitably chosen markings in the original signal. We develop one information-theoretic formulation of this problem, and identify and interpret the associated f...

متن کامل

Zero-Distortion Authentication Watermarking

This paper proposes a zero-distortion authentication watermarking to produces a watermarked signal. With the same decoder, the watermarked signal has the same quality as the original one. To this end, the scheme replaces the original signal with its equivalence so as to embed authentication message. We employ this concept to authenticate palette images by regulating the palette. Because the vis...

متن کامل

Distortion-Free Authentication Watermarking

In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.

متن کامل

Database Authentication by Distortion Free Watermarking

In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the ta...

متن کامل

Criteria for Evaluating Authentication Systems

User authentication is an important component of information security. It is critical in addressing many concerns that consumers and business have over the risk of identity theft. However, there is no systematic method to measure how good an authentication mechanism is in a given business context. This paper outlines nine criteria businesses can use to assess authentication systems. With these ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2005

ISSN: 0018-9448

DOI: 10.1109/tit.2005.850123