Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences
نویسندگان
چکیده
This paper presents an interesting application of the Tillich-Zémor function TZ . In particular, we emphasize the concatenation property of this one-way hash function, i.e. TZ(S | T ) = TZ(S) TZ(T ) where S and T are two binary strings. This property is combined with a multisignature scheme in a journalism context. The aim is to authenticate reports or interviews.
منابع مشابه
Hash Function: Application to Video Sequences
This paper presents an interesting application of the Tillich-Zémor function TZ . In particular, we emphasize the concatenation property of this one-way hash function, i.e. TZ(S j T ) = TZ(S)TZ(T ) where S and T are two binary strings. This property is combined with a multisignature scheme in a journalism context. The aim is to authenticate reports or interviews.
متن کاملAdaptive Spectral Separation Two Layer Coding with Error Concealment for Cell Loss Resilience
This paper addresses the issue of cell loss and its consequent effect on video quality in a packet video system, and examines possible compensative measures. In the system's enconder, adaptive spectral separation is used to develop a two-layer coding scheme comprising a high priority layer to carry essential video data and a low priority layer with data to enhance the video image. A two-step er...
متن کاملIRF and ISRF Sequences and their Anti-Pedagogical Value
Initiation, Response, and Feedback(IRF) sequences are the most frequent interaction network in any classroom contexts. IRF sequences have been examined profusely in previous studies and were reported to be negatively correlated with participation opportunities (Kasper, 2006; Cazden, 2001; Ellis, 1994).In all these studies, all contingent factors of any classroom context which might influence in...
متن کاملA Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and unique representation (also known as hashed values or string-sequences) of the image data. These string-sequences are signed by an error-correcting-code signature scheme, which produces short and secure signatures. The ...
متن کاملالگوریتم کنترل نرخ بیت متغیر ویدئو در سطح گروه تصاویر برای استاندارد فشردهسازی H.265
A rate control algorithm at the group of picture (GOP) level is proposed in this paper for variable bit rate applications of the H.265/HEVC video coding standard with buffer constraint. Due to structural changes in the HEVC compared to the previous standards, new rate control algorithms are needed to be designed. In the proposed algorithm, quantization parameter (QP) of each GOP is obtained by ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 5 شماره
صفحات -
تاریخ انتشار 1997