Online ISSN
1751-8717
Print ISSN
1751-8709
IET Information Security
Volume 1, Issue 3, September 2007
Volumes & issues:
Volume 1, Issue 3
September 2007
-
- Author(s): L. Zhang ; W.W. Xiao ; Z. Ji
- Source: IET Information Security, Volume 1, Issue 3, p. 97 –105
- DOI: 10.1049/iet-ifs:20060105
- Type: Article
- + Show details - Hide details
-
p.
97
–105
(9)
Image watermarking has become a popular technique for authentication and copyright protection. However, many proposed image watermarking techniques are sensitive to affine transforms, such as rotation, scaling and translation. Here, a local affine transform invariant watermarking is designed and tested against attacks performed by Stirmark using the Krawtchouk moment invariants. Watermark is inserted into the perceptually significant Krawtchouk moment invariants of the original image, and watermarking based on Krawtchouk moment invariants are local, that is, the embedded watermark affects only a selected portion of the original image, the position of which can be decided by the user. This, in effect, permits the watermark to be embedded at the portion of the image which is most significant information-wise. This also means that the watermark is especially robust to cropping. Independent component analysis (ICA) is utilised by detector to extract the perfect watermark blindly. The computational aspects of the proposed watermarking are also discussed in detail. Experimental results have demonstrated that the proposed watermarking technique has a good robustness against other attacks performed by Stirmark including affine transform, cropping, filtering, image compression and random geometric distortions. It is indicated that the proposed watermarking has superior advantages over the existing ones in many aspects. - Author(s): M. Joye ; P. Manet ; J.-B. Rigaud
- Source: IET Information Security, Volume 1, Issue 3, p. 106 –110
- DOI: 10.1049/iet-ifs:20060163
- Type: Article
- + Show details - Hide details
-
p.
106
–110
(5)
Differential fault attacks become a threat of increasing importance against cryptographic devices. One of the most efficient hardware countermeasures for block ciphers to prevent such attacks relies on duplication. Novel techniques to implement a duplication scheme for the AES are proposed. Remarkably, the proposed techniques do not impact on the throughput/area ratio and better withstand a large variety of known fault attacks. - Author(s): A. Mashatan and D.R. Stinson
- Source: IET Information Security, Volume 1, Issue 3, p. 111 –118
- DOI: 10.1049/iet-ifs:20060131
- Type: Article
- + Show details - Hide details
-
p.
111
–118
(8)
The problem of non-interactive message authentication using an insecure broadband channel and an authenticated narrow-band channel is considered. This problem has been considered in the context of ad hoc networks, where it is assumed that there is neither a secret key shared among the two parties nor a public-key infrastructure in place. A formal framework for protocols of this type is presented, along with a new protocol which is as efficient as the best previous protocols. The security of the proposed protocol is based on a new property of hash functions called ‘hybrid-collision resistance’. - Author(s): P. Mell and K. Scarfone
- Source: IET Information Security, Volume 1, Issue 3, p. 119 –127
- DOI: 10.1049/iet-ifs:20060055
- Type: Article
- + Show details - Hide details
-
p.
119
–127
(9)
The Common Vulnerability Scoring System is an emerging standard for scoring the impact of vulnerabilities. The results of an analysis of the scoring system and that of an experiment scoring a large set of vulnerabilities using the standard are presented. Although the scoring system was found to be useful, it contains a variety of deficiencies that limit its ability to measure the impact of vulnerabilities. The study demonstrates how these deficiencies could be addressed in subsequent versions of the standard and how these changes are backwards-compatible with the existing scoring efforts. In conclusion a recommendation for a revised scoring system and an analysis of experiments that demonstrate how the revision would address deficiencies discovered in the existing version of the standard are presented. - Author(s): M. Bucci ; R. Luzzi ; F. Menichelli ; R. Menicocci ; M. Olivieri ; A. Trifiletti
- Source: IET Information Security, Volume 1, Issue 3, p. 128 –133
- DOI: 10.1049/iet-ifs:20060112
- Type: Article
- + Show details - Hide details
-
p.
128
–133
(6)
The susceptibility of cryptographic devices to attacks based on power analysis can be both significantly and efficiently tested at early design steps. The results from a real case application show the advantages of the approach. - Author(s): C.-M. Lo ; T. Hwang ; C.-M. Li
- Source: IET Information Security, Volume 1, Issue 3, p. 134 –141
- DOI: 10.1049/iet-ifs:20070045
- Type: Article
- + Show details - Hide details
-
p.
134
–141
(8)
Public-key certificates, which are used to associate public keys with certificate owner identifiers, play an important role in public-key infrastructures. Each public-key certificate must be revoked as soon as its corresponding private key is compromised, lost or invalid. Before a public key is used, its associated public-key certificate must therefore be verified to ensure that it has not been revoked. However, the revocation and revocation notification of public keys are sometimes costly in terms of communication and computation requirements. A new unimplemented public-key encryption is proposed, which allows a user to update his private key without changing the corresponding public key, so that public-key revocation and revocation verification are not needed. In addition, the proposed scheme provides the following benefits: (1) prompt disabling of decryption capability (users' decryption ability can be revoked in real time); (2) personal key privacy (users select their partial private key without exposing it to certificate authorities) and (3) chosen-ciphertext security (the proposed scheme is provably secure against adaptive chosen-ciphertext attacks, in the random oracle model).
Local affine transform invariant image watermarking by Krawtchouk moment invariants
Strengthening hardware AES implementations against fault attacks
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions
Improving the Common Vulnerability Scoring System
Testing power-analysis attack susceptibility in register-transfer level designs
Revocation-free public-key encryption based on security-mediated public-key infrastructure
Most viewed content for this Journal
Article
content/journals/iet-ifs
Journal
5
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article