메뉴 건너뛰기




Volumn , Issue , 2008, Pages 3124-3127

On the security of non-forgeable robust hash functions

Author keywords

Image recognition; Security

Indexed keywords

CHOSEN MESSAGE ATTACKS; CONTENT-DEPENDENT WATERMARK; CRYPTOGRAPHIC HASH FUNCTIONS; FORGERY ATTACKS; HASH VALUE; HIGH PROBABILITY; MULTIMEDIA OBJECT; NOISY CHANNEL; NOISY VERSIONS; ROBUST HASH; SECURITY; SECURITY NOTION; SESSION KEY;

EID: 69949141557     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2008.4712457     Document Type: Conference Paper
Times cited : (6)

References (11)
  • 2
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, 1998.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.L.3    Yeung, M.M.4
  • 5
    • 33750905324 scopus 로고    scopus 로고
    • Robust, short and sensitive authentication tags using secure sketch
    • Short paper
    • Q. Li and E.-C. Chang, "Robust, short and sensitive authentication tags using secure sketch," in ACM Multimedia and Security Workshop, 2006, Short paper.
    • (2006) ACM Multimedia and Security Workshop
    • Li, Q.1    Chang, E.-C.2
  • 6
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocrypt, of
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt, 2004, vol. 3027 of LNCS, pp. 523-540.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 7
    • 84947226140 scopus 로고    scopus 로고
    • A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding
    • Information Hiding Workshop, of
    • M.K. Mihcak and R. Venkatesan, "A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding," in Information Hiding Workshop, 2001, vol. 2137 of LNCS, pp. 51-65.
    • (2001) LNCS , vol.2137 , pp. 51-65
    • Mihcak, M.K.1    Venkatesan, R.2
  • 8
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, 2006.
    • (2006) IEEE Trans. Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 9
    • 0031096505 scopus 로고    scopus 로고
    • Near shannon limit performance of low density parity check codes
    • D.J.C. MacKay and R.M. Neal, "Near shannon limit performance of low density parity check codes," Electronics Letters, vol. 33, no. 6, pp. 457-458, 1997.
    • (1997) Electronics Letters , vol.33 , Issue.6 , pp. 457-458
    • MacKay, D.J.C.1    Neal, R.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.