2004
DOI: 10.1002/cpe.804
|View full text |Cite
|
Sign up to set email alerts
|

Augmenting LZ‐77 with authentication and integrity assurance capabilities

Abstract: SUMMARYThe formidable dissemination capability allowed by the current network technology makes it increasingly important to devise new methods to ensure authenticity and integrity. Nowadays it is common practice to distribute documents in compressed form. In this paper, we propose a simple variation on the classic LZ-77 algorithm that allows one to hide, within the compressed document, enough information to warrant its authenticity and integrity. The design is based on the unpredictability of a certain class o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The side-channel is general purpose and it may carry any useful data. In previous work, it has been used for information hiding, or steganography [2], for authentication [1], for error detection or correction [9], and for bit recycling [4], [6], [13]. This last application is described in greater detail next.…”
Section: Data Embedding Via Match Selectionmentioning
confidence: 98%
“…The side-channel is general purpose and it may carry any useful data. In previous work, it has been used for information hiding, or steganography [2], for authentication [1], for error detection or correction [9], and for bit recycling [4], [6], [13]. This last application is described in greater detail next.…”
Section: Data Embedding Via Match Selectionmentioning
confidence: 98%
“…At most log 2 (r) additional bits can be embedded by selecting one of the r pointer options. These additional bits can be used for various purposes, such as authentication [21] or bit error repair.…”
Section: A Lzsr Algorithmmentioning
confidence: 99%
“…1). These additional bits can be used for various purposes such as authentication [2] or error correction as described next. In passing, we should acknowledge that the idea of detecting multiple matches of the longest LZ'77 prefix was already considered by Fiala and Greene [6] as a strategy to improve compression.…”
Section: A Redundant Information In Lzs'77mentioning
confidence: 99%