On Authentication With Distortion Constraints
نویسندگان
چکیده
In many multimedia applications, there is a need to authenticate sources subjected to benign degradations such as noise, compression, etc., in addition to potential tampering attacks. Authentication can be enabled through the embedding of suitably chosen markings in the original signal. We develop one information-theoretic formulation of this problem, and identify and interpret the associated fundamental performance limits.
منابع مشابه
A novel interpretation of content authentication
This work deals with practical and theoretical issues raised by the information-theoretical framework for authentication with distortion constraints proposed by Martinian et al. The optimal schemes proposed by these authors rely on random codes which bear close resemblance to the dirty-paper random codes which show up in data hiding problems. On the one hand, this would suggest to implement pra...
متن کاملDigital Watermarking Methods for Authentication, Tamper Localization and Lossless Recovery
This thesis addresses authentication watermarking and compression of digital images under zero-distortion and maximum-per-sample-distortion constraints. In this context, a hierarchical authentication watermark is proposed for securely verifying the source and integrity of digital images and for determining altered image regions when the integrity verification fails. The proposed approach elimin...
متن کاملDistortion-Free Authentication Watermarking
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملDigital Watermarking , Fingerprinting and Compression : An Information -
Title of Dissertation: DIGITAL WATERMARKING, FINGERPRINTING AND COMPRESSION: AN INFORMATION-THEORETIC PERSPECTIVE Damianos Karakos, Doctor of Philosophy, 2002 Dissertation directed by: Professor Adrian Papamarcou Department of Electrical and Computer Engineering The ease with which digital data can be duplicated and distributed over the media and the Internet has raised many concerns about copy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001