Statistics- and spatiality-based feature distance measure for error resilient image authentication
Transactions on data hiding and multimedia security II
Evolvement of DRM schema: from encryption to interoperability and monitoring
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 754.84 |
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.