Sciweavers

12 search results - page 1 / 3
» Evaluation of JPEG2000 hashing for efficient authentication
Sort
View
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
13 years 2 months ago
Evaluation of JPEG2000 hashing for efficient authentication
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contai...
Dominik Engel, Thomas Stütz, Andreas Uhl
ICIP
2004
IEEE
14 years 6 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
13 years 10 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
13 years 9 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
13 years 8 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...