메뉴 건너뛰기




Volumn 5306, Issue , 2004, Pages 602-609

New attacks on sari image authentication system

Author keywords

Digital signature; Histogram attack; Image authentication; Integrity verification; Oracle attack; SARI

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL WATERMARKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE RECONSTRUCTION; SECURITY OF DATA;

EID: 8644231988     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.526636     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 2
    • 8644240462 scopus 로고    scopus 로고
    • Multimedia authentication and watermarking
    • D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, chap. 7
    • B. B. Zhu and M. D. Swanson, "Multimedia Authentication and Watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, 2003, chap. 7, pp. 148-177.
    • (2003) Multimedia Information Retrieval and Management , pp. 148-177
    • Zhu, B.B.1    Swanson, M.D.2
  • 3
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • San Jose, Jan
    • C.-Y. Lin and S.-F. Chang, "A Robust Image Authentication Method Surviving JPEG Lossy Compression," SPIE Storage and Retrieval of Image/Video Database, San Jose, vol. 3312, no. 37, pp. 296-307, Jan 1998.
    • (1998) SPIE Storage and Retrieval of Image/Video Database , vol.3312 , Issue.37 , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 4
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.-Y. Lin and S.-F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans Circuits and Systems of Video Tech., vol. 11, no. 2, pp. 153-168, 2001.
    • (2001) IEEE Trans Circuits and Systems of Video Tech. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 5
  • 6
    • 0036290727 scopus 로고    scopus 로고
    • A new semi-fragile image authentication framework combining ECC and PKI infrastructure
    • Q. Sun, S.-F. Chang, K. Maeno, and M. Suto, "A New Semi-fragile Image Authentication Framework Combining ECC and PKI Infrastructure," IEEE Int. Circuits & Systems, 2002, vol. 2, pp. 440-443.
    • (2002) IEEE Int. Circuits & Systems , vol.2 , pp. 440-443
    • Sun, Q.1    Chang, S.F.2    Maeno, K.3    Suto, M.4
  • 7
    • 0035163017 scopus 로고    scopus 로고
    • On the security of the SARI image authentication system
    • R. Radhakrishnan and N. Memon, "On the Security of the SARI Image Authentication System," IEEE Int. Conf. Image Processing, vol. 3, pp. 971-974, 2001.
    • (2001) IEEE Int. Conf. Image Processing , vol.3 , pp. 971-974
    • Radhakrishnan, R.1    Memon, N.2
  • 8
    • 0036865504 scopus 로고    scopus 로고
    • On the security of the digest function in the SARI image authentication system
    • Nov
    • R. Radhakrishnan, N. Memon, "On the Security of the Digest Function in the SARI Image Authentication System," IEEE Trans. Circuits and Systems for Video Technology, vol. 12, no. 11, pp. 1030-1033, Nov. 2002.
    • (2002) IEEE Trans. Circuits and Systems for Video Technology , vol.12 , Issue.11 , pp. 1030-1033
    • Radhakrishnan, R.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.