Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Information hiding: steganography and watermarking—attacks and countermeasures
Information hiding: steganography and watermarking—attacks and countermeasures
Information and Computation
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Management of trusted citations
Proceedings of the 2003 ACM symposium on Document engineering
Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series)
Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series)
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
A new approach to efficient authentication of quotations from trusted sources but embedded in messages created by unknown authors is proposed. Two different techniques for efficient generation of authenticable quotations using cascaded hashing are proposed for conventional quotations, and an efficient two-dimensional signature generation technique is proposed for two-dimensional quotations from spreadsheets. A technique for associating the signature with the quotation in the Microsoft Word document is also proposed for generation of integrated authenticable quotations that survive copy-and-paste operations.