Sciweavers

Share
JCP
2007

Watermarks and Text Transformations in Visual Document Authentication

8 years 8 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based on cryptography and require computers or similar hardware to be produced. They can be trusted only as long as the employed hardware can be trusted. We present a complementary scheme for document authentication in untrusted environment. The scheme combines visual authentication, human-recognizable watermarks, and image transformations, and is suitable also for larger text document. Because it relies on visual cryptography, it requires practically no computational power on the receiver side. To prevent potential attackers from obtaining signatures without author’s knowledge, we propose using a simple challenge-response protocol.
Igor Fischer, Thorsten Herfet
Added 15 Dec 2010
Updated 15 Dec 2010
Type Journal
Year 2007
Where JCP
Authors Igor Fischer, Thorsten Herfet
Comments (0)
books