The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A stream cipher namely the HSC (hashing stream cipher) which uses a regular one-way hash function to generate pseudorandom keystream iteratively is proposed. Since the timestamp is used in the keystream generator, the algorithm achieves the robustness against the adaptive-chosen-plaintext attack. The oneway hash function is the core of the algorithm, so the security analysis of the algorithm is shifted...
A novel statistic based algorithm for watermarking 2D vector maps is proposed. Unlike other multimedia data types, 2D vector map data has many special features, which make the selection of the cover data become a crucial issue directly influencing the performance of the watermarking scheme. In our proposed scheme, the selected cover data is a distance sequence extracted from the original map based...
In this paper, a new blind video watermarking algorithm is proposed based on the singular value decomposition. The watermarks can be detected without the original video or any other information of the original singular values. Experiments show that the algorithm bears desirable robustness on MPEG-2 compression, median filtering, small rescaling, and rotation, etc
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital watermark technique and the characteristic of relational databases, a scheme of watermarking relational databases based on content characteristic is proposed in this paper. The corresponding algorithms of watermark embedding...
Identification and authorization are the two important problems among the intractable issues of network security. In this thesis, we first discuss the advantages and disadvantages of several traditional ways in identification and authorization including Kerberos, SSL, DAC, MAC, RBAC and PKI/PMI. Because of the inherent weakness of DAC and MAC, and the complexity of PMI, we propose a new system which...
With multimedia developing rapidly, copyright protection and authentication is more and more important. Digital watermark is one of the most efficient methods to protect multimedia products. Print and scan attack is a challenging problem for most of digital watermarks. In this paper, the geometric distortion and halftone in print-and-scan process is analyzed for the sake of presenting a model of print-and-scan...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.