An Image Authentication Scheme Using Merkle Tree Mechanisms
نویسندگان
چکیده
منابع مشابه
Merkle Tree Authentication in UDDI Registries
UDDI registries are today the standard way of publishing information on web services. They can be thought of as a structured repository of information that can be queried by clients to find the web services that better fit they needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more a...
متن کاملAn Efficient Smart Card Based Authentication Scheme Using Image Encryption
CHIN-CHEN CHANG, HSIAO-LING WU, ZHI-HUI WANG AND QIAN MAO Department of Information Engineering and Computer Science Feng Chia University Taichung, 407 Taiwan Department of Computer Science and Information Engineering Asia University Taichung, 413 Taiwan School of Software Dalian University of Technology Dalian City, 116 P.R. China Department of Optical-Electrical and Computer Engineering Unive...
متن کاملSlightly Improved Merkle Tree Traversal for User Authentication Using Pseudorandomly-Generated Leaves
Merkle trees can be used for a variety of cryptographic purposes, including digital signatures and user authentication. We describe a technique for pseudorandomly generating the private values corresponding to the leaves of a Merkle tree from a common seed. The technique allows for secure user authentication with fewer hash function evaluations required to generate the authentication data. Usin...
متن کاملAn Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2019
ISSN: 1999-5903
DOI: 10.3390/fi11070149