On the Design of Secure Multimedia Authentication_final.dvi
نویسندگان
چکیده
At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The third category is the content-based watermarking authentication schemes in which the watermark is generated by the multimedia content. However, there exists the security question in the above-mentioned three categories of the authentication schemes. In this paper, a novel concept that is called ”authentication set” is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called ”Cover Authentication Set”, ”Attack Authentication Set”, ”Watermark-based Authentication Set” or ”Signature-based Authentication Set”, ”Verified Authentication Set” and ”Malicious-attack Authentication Set”. According to the relation among the aforementioned sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the
منابع مشابه
Examining the Effectiveness of Instructional Multimedia Based on Reducing the Extraneous Cognitive Load in English language Learning among Nursing Students
Background: Considering the assumptions of cognitive load theory and using its reduction and optimization strategies in the design and development of instructional content is one of the main requirements for achieving effective learning. This study examined the effectiveness of instructional multimedia based on reducing the extraneous cognitive load in English language learning among Nursing st...
متن کاملPersonalization in the design and production of multimedia in the e-learning environment
Aims: E-learning, is a phenomenon of the modern world That in the information era and the knowledgebased society has come into existence and in its short history has been expanded with considerable speed. The impact and application of the principle of personalization in the design and production of multimedia products in its electronic. Methods: This article is a review of the literature ...
متن کاملEye-Tracking Method’ Usage for Understanding the Cognitive Processes in Multimedia Learning
Introduction: Designing multimedia learning environments should consist of the evidence-based study and principals about the human learning process. Eye tracking is a way based on the learner processing of learning materials which presented in multimedia learning environments. The aim of the study was to examine the use of the eye-tracking method to investigate the cognitive processes in m...
متن کاملThe Effect used multimedia with worked examples on learning and Retention in a mathematic course
Multimedia production increasing in recent decades, progress in education and training has been accepted as a style that should be designed according to scientific principles. One of the most important principles in its study, using the example of education. Examples are discussed education as a teaching method and are used in various ways to facilitate learning. In this study, pretest-posttest...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009