
Proceedings Paper
Information-theoretic analysis of electronic and printed document authenticationFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
In this paper we consider the problem of document authentication in electronic and printed forms. We formulate this problem from the information-theoretic perspectives and present the joint source-channel coding theorems showing the performance limits in such protocols. We analyze the security of document authentication methods and present the optimal attacking strategies with corresponding complexity estimates that, contrarily to the existing studies, crucially rely on the information leaked by the authentication protocol. Finally, we present the results of experimental validation of the developed concept that justifies the practical efficiency of the elaborated framework.
Paper Details
Date Published: 17 February 2006
PDF: 20 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721D (17 February 2006); doi: 10.1117/12.641940
Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)
PDF: 20 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721D (17 February 2006); doi: 10.1117/12.641940
Show Author Affiliations
Sviatoslav Voloshynovskiy, Univ. of Geneva (Switzerland)
Oleksiy Koval, Univ. of Geneva (Switzerland)
Renato Villan, Univ. of Geneva (Switzerland)
Emre Topak, Univ. of Geneva (Switzerland)
Oleksiy Koval, Univ. of Geneva (Switzerland)
Renato Villan, Univ. of Geneva (Switzerland)
Emre Topak, Univ. of Geneva (Switzerland)
José Emilio Vila Forcén, Univ. of Geneva (Switzerland)
Frederic Deguillaume, Univ. of Geneva (Switzerland)
Yuriy Rytsar, Univ. of Geneva (Switzerland)
Thierry Pun, Univ. of Geneva (Switzerland)
Frederic Deguillaume, Univ. of Geneva (Switzerland)
Yuriy Rytsar, Univ. of Geneva (Switzerland)
Thierry Pun, Univ. of Geneva (Switzerland)
Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)
© SPIE. Terms of Use
