Robust Image Authentication in the Presence of Noise 2015
DOI: 10.1007/978-3-319-13156-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Hash-Based Authentication of Digital Images in Noisy Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…These algorithms reduce intricacy and hold resistance against linear and differential attacks. The researchers have also introduced noise-tolerant ciphers capable of resisting disruptive effects, both intended and unintended [55]- [58]. Lightweight ciphers have a drawback that they can't tolerate noise caused by the channels.…”
Section: Related Workmentioning
confidence: 99%
“…These algorithms reduce intricacy and hold resistance against linear and differential attacks. The researchers have also introduced noise-tolerant ciphers capable of resisting disruptive effects, both intended and unintended [55]- [58]. Lightweight ciphers have a drawback that they can't tolerate noise caused by the channels.…”
Section: Related Workmentioning
confidence: 99%
“…One of the necessary features of a modern security system is to be noise resistant [29,30]. The noise can be added intentionally by an unauthenticated user or can be caused due to the channel noise; channel can be wired or wireless as well.…”
Section: Robustness: Noise Resistant Analysismentioning
confidence: 99%
“…These transformation domain techniques show good robustness and security against various attacks as compared to spatial domain techniques. In the last few years, researchers start to combine between these techniques such as combining between SVD-DCT [15][16], DWT-SVD [17][18], DWT-DCT [19][20], and DWT-DCT-SVD [21] ignored to improve the performance of watermarking process. Traditional encryption algorithms such as Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and Advanced Encryption Standard (AES) etc.…”
Section: Literature Reviewmentioning
confidence: 99%