Sciweavers

853 search results - page 4 / 171
» Flexible authentication of images
Sort
View
CCS
2001
ACM
14 years 5 hour ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
INFOCOM
1997
IEEE
13 years 11 months ago
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
Philippe A. Janson, Gene Tsudik, Moti Yung
ICIP
2001
IEEE
14 years 9 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
ICIP
2007
IEEE
14 years 9 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod