The computational complexity of universal hashing
Theoretical Computer Science - Special issue on structure in complexity theory
Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the cardinality of systematic authentication codes via error-correcting codes
IEEE Transactions on Information Theory
Hi-index | 0.00 |
This paper is concerned with the implementation of an imagecomparison algorithm and cryptographic hash functions on the regulararray of cellular neural network (CNN) cells. These operations arenecessary for message authentication and copyright protection in themultimedia service environment, serving both the interest of thecopyright owner and the user. The basicproblems of multimedia protection along with the requirements androle of the different actors in a multimedia service environment arealso described here.