A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Overview of Elliptic Curve Cryptography
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Analysis of security vulnerabilities in the movie production and distribution process
Proceedings of the 3rd ACM workshop on Digital rights management
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents a novel approach to secure transaction tracking. The focus of the proposed scheme is on preventing insider attacks particularly prevalent in multimedia transactions, assuming both parties involved in a transaction are mutually distrustful. To achieve authentication and non-repudiation, the proposed system, called staining, is composed of two key components: public-key cryptography and basic watermarking. The concept is to watermark after encryption, thereby introducing a stain on the watermark due to decryption. Watermarking and cryptography are not usually combined in such a manner, due to several issues involved, which are also discussed.