An Image Authentication Scheme Using Merkle Tree Mechanisms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Merkle Tree Authentication in UDDI Registries

UDDI registries are today the standard way of publishing information on web services. They can be thought of as a structured repository of information that can be queried by clients to find the web services that better fit they needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more a...

متن کامل

An Efficient Smart Card Based Authentication Scheme Using Image Encryption

CHIN-CHEN CHANG, HSIAO-LING WU, ZHI-HUI WANG AND QIAN MAO Department of Information Engineering and Computer Science Feng Chia University Taichung, 407 Taiwan Department of Computer Science and Information Engineering Asia University Taichung, 413 Taiwan School of Software Dalian University of Technology Dalian City, 116 P.R. China Department of Optical-Electrical and Computer Engineering Unive...

متن کامل

Slightly Improved Merkle Tree Traversal for User Authentication Using Pseudorandomly-Generated Leaves

Merkle trees can be used for a variety of cryptographic purposes, including digital signatures and user authentication. We describe a technique for pseudorandomly generating the private values corresponding to the leaves of a Merkle tree from a common seed. The technique allows for secure user authentication with fewer hash function evaluations required to generate the authentication data. Usin...

متن کامل

An Image Authentication Scheme Based on Correlation

This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2019

ISSN: 1999-5903

DOI: 10.3390/fi11070149