A Novel Patch-Based Digital Signature
author
Abstract:
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encoding algorithm converts the characters stream of the secret message to the patches stream of the DS image. The final image is further distorted by noise to hide the source patches. Nevertheless, the decoding algorithm uses a similarity measure to decode the DS image. Experimental results demonstrated that it is significantly robust against noise. The proposed approach has been successfully used for digital signature generation/verification and software copyright protection
similar resources
Novel Digital Signature Schemes based on Factoring and Discrete Logarithms
In the paper, we propose a new digital signature scheme based on factoring and discrete logarithms. Specially, we prove that the security of the proposed signature scheme is based on both the security of the ElGamal signature scheme and the security of the modified OSS signature scheme. This is the first scheme which can be proved that its security is based on two hard problems. Like Meta-ElGam...
full textDigital Signature based Proxy Multi-Signature Scheme
A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose ECDLP based solution for chen et. al [1] scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compare...
full textA Practical Lattice-based Digital Signature Schemes
JAMES HOWE, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK THOMAS PÖPPELMANN, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany MÁIRE O’NEILL, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK ELIZABETH O’SULLIVAN, Centre for Secure Information Technologies (CSIT), Queen’s University Belfast, UK TIM GÜNEYSU,...
full textA Digital Signature Scheme based on CVP
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, which security is related to the hardness of approximating the closest vector problem (CVP) in a lattice. Furthermore, they also described how to use the same principle of their encryption scheme to provide a signature scheme. Practically, this cryptosystem uses the euclidean ...
full textA Novel Algorithm for Digital Distance Relaying
Distance relays are used to protect EHV and HV Transmission lines. Over the past decades many algorithms have emerged for digital distance relays. These are based on the calculation of the transmission line impedance from the relaying to fault points. In this paper a novel method for digital distance relaying is proposed. In the method the tracking procedure is implemented. The method uses the ...
full textMy Resources
Journal title
volume 15 issue 4
pages 37- 47
publication date 2019-02
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023