메뉴 건너뛰기




Volumn 1, Issue 1, 2006, Pages 56-67

Approximate message authentication codes for N-ary alphabets

Author keywords

authentication code (MAC); Chosen message attack; hash function; message; multimedia message authentication

Indexed keywords


EID: 85008040083     PISSN: 15566013     EISSN: 15566021     Source Type: Journal    
DOI: 10.1109/TIFS.2005.863504     Document Type: Article
Times cited : (27)

References (16)
  • 1
    • 0003855464 scopus 로고    scopus 로고
    • Applied Cryptography: Protocols, Algorithms, and Source Code in C
    • 2nd ed. New York: Wiley
    • B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: Wiley, 1996.
    • (1996)
    • Schneier, B.1
  • 2
    • 85032752228 scopus 로고    scopus 로고
    • When seeing isn’t believing: Current multimedia authentication technologies and their applications
    • Mar.
    • B. B. Zhu, M. D. Swanson, and A. H. Tewfik, “When seeing isn’t believing: Current multimedia authentication technologies and their applications,” IEEE Signal Process. Mag., pp. 40–49, Mar. 2004.
    • (2004) IEEE Signal Process. Mag. , pp. 40-49
    • Zhu, B.B.1    Swanson, M.D.2    Tewfik, A.H.3
  • 3
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • Sep.
    • C. W. Wu, “On the design of content-based multimedia authentication systems,” IEEE Trans. Multimedia, vol. 4, no. 3, pp. 385–393, Sep. 2002.
    • (2002) IEEE Trans. Multimedia , vol.4 , Issue.3 , pp. 385-393
    • Wu, C.W.1
  • 6
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • Jun.
    • L. Xie, G. R. Arce, and R. F. Gravemen, “Approximate image message authentication codes,” IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242–252, Jun. 2001.
    • (2001) IEEE Trans. Multimedia , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Gravemen, R.F.3
  • 7
    • 33750901987 scopus 로고    scopus 로고
    • A formal security analysis of approximate message authentication codes
    • College Park, MD, Apr.
    • G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge, “A formal security analysis of approximate message authentication codes,” in Proc. CTA Communications and Networks, College Park, MD, Apr. 2003, pp. 217–221.
    • (2003) Proc. CTA Communications and Networks , pp. 217-221
    • Di Crescenzo, G.1    Graveman, R.2    Arce, G.3    Ge, R.4
  • 9
    • 0004325716 scopus 로고
    • GENETICS A Molecular Approach
    • 2nd ed. London, U.K.: Chapman & Hall
    • T. A. Brown, GENETICS A Molecular Approach, 2nd ed. London, U.K.: Chapman & Hall, 1995.
    • (1995)
    • Brown, T.A.1
  • 10
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Lausanne, Switzerland, Sept.
    • M. Schneider and S. Chang, “A robust content based digital signature for image authentication,” in Proc. IEEE Intl. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996.
    • (1996) Proc. IEEE Intl. Conf. Image Processing
    • Schneider, M.1    Chang, S.2
  • 11
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • Feb.
    • D.-C. Lou and J.-L. Liu, “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31–39, Feb. 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.-C.1    Liu, J.-L.2
  • 12
    • 1442357585 scopus 로고    scopus 로고
    • Robust image authentication using content based compression
    • Aug.
    • E. Chang, M. Kankanhalli, and X. Guan, “Robust image authentication using content based compression,” ACM Multimedia Syst., vol. 9, pp. 121–130, Aug. 2003.
    • (2003) ACM Multimedia Syst. , vol.9 , pp. 121-130
    • Chang, E.1    Kankanhalli, M.2    Guan, X.3
  • 13
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb.
    • C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 14
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • Jun.
    • C.-S. Lu and H.-Y. Liao, “Structural digital signature for image authentication: An incidental distortion resistant scheme,” IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161–173, Jun. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.-S.1    Liao, H.-Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.