Online ISSN
1751-8717
Print ISSN
1751-8709
IET Information Security
Volume 2, Issue 4, December 2008
Volumes & issues:
Volume 2, Issue 4
December 2008
-
- Author(s): C. Tartary ; S. Zhou ; D. Lin ; H. Wang ; J. Pieprzyk
- Source: IET Information Security, Volume 2, Issue 4, p. 99 –107
- DOI: 10.1049/iet-ifs:20070091
- Type: Article
- + Show details - Hide details
-
p.
99
–107
(9)
An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed. - Author(s): S. Narayan and U. Parampalli
- Source: IET Information Security, Volume 2, Issue 4, p. 108 –118
- DOI: 10.1049/iet-ifs:20070135
- Type: Article
- + Show details - Hide details
-
p.
108
–118
(11)
The authors describe signature constructions in the standard model based on the hardness of the computational Diffie–Hellman problem over gap and co-gap groups. The schemes are computationally efficient and have reduced public parameter size when compared with other identity-based signatures in the standard model. - Author(s): M. Jayalakshmi ; S.N. Merchant ; U.B. Desai
- Source: IET Information Security, Volume 2, Issue 4, p. 119 –128
- DOI: 10.1049/iet-ifs:20070106
- Type: Article
- + Show details - Hide details
-
p.
119
–128
(10)
Watermark retrieval in wavelet domain has been proved to be more robust from significant coefficients than high absolute coefficients when a single copy of the watermark is embedded in the original data. The highest absolute coefficients refer to the coefficients with the highest absolute values in any selected band and significant coefficients refer to the coefficients with the highest significance factor with respect to their inter-band dependencies in a wavelet transformed image. The watermark energy can be maximised at each of the selected coefficient by quantising it to the maximum allowable level suggested by a human visual system model. However, as the attacks become very severe, a single copy of the watermark is not sufficient for correct retrieval. Hence, the authors propose a method of optimum retrieval of the watermark from multiple embedded copies under very severe attacks. The authors propose to use the Chair–Varshney decision fusion rule to decide each bit in the watermark instead of the majority rule for optimum watermark retrieval. Simulations are performed to show the superiority of the method with different numbers of watermark copies under various attacks. Extensive simulations are carried out to plot the receiver operating characteristics in order to compare the proposed method with the majority rule. - Author(s): H. Malik ; R. Ansari ; A. Khokhar
- Source: IET Information Security, Volume 2, Issue 4, p. 129 –150
- DOI: 10.1049/iet-ifs:20070145
- Type: Article
- + Show details - Hide details
-
p.
129
–150
(22)
A novel audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique is presented. Unlike most of the existing spread spectrum (SS) watermarking schemes that use the entire audible frequency range for watermark embedding, the proposed scheme randomly selects subband(s) signal(s) of the host audio signal for watermark embedding. The proposed FSSS scheme provides a natural mechanism to exploit the band-dependent frequency-masking characteristics of the human auditory system to ensure the fidelity of the host audio signal and the robustness of the embedded information. Key attributes of the proposed scheme include reduced host interference in watermark detection, better fidelity, secure embedding and improved multiple watermark embedding capability. To detect the embedded watermark, two blind watermark detection methods are examined, one based on normalised correlation and the other based on estimation correlation. Extensive simulation results are presented to analyse the performance of the proposed scheme for various signal manipulations and standard benchmark attacks. A comparison with the existing full-band SS-based schemes is also provided to show the improved performance of the proposed scheme. - Author(s): F. Liu ; C.K. Wu ; X.J. Lin
- Source: IET Information Security, Volume 2, Issue 4, p. 151 –165
- DOI: 10.1049/iet-ifs:20080066
- Type: Article
- + Show details - Hide details
-
p.
151
–165
(15)
Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting research topic after the formal introduction of visual cryptography by Naor and Shamir in 1995. The authors propose a colour (k, n)-VCS under the visual cryptography model of Naor and Shamir with no pixel expansion, and a colour (k, n)-extended visual cryptography scheme ((k, n)-EVCS) under the visual cryptography model of Naor and Shamir with pixel expansion the same as that of its corresponding black and white (k, n)-EVCS. Furthermore, the authors propose a black and white (k, n)-VCS and a black and white (k, n)-EVCS under the visual cryptography model of Tuyls. Based on the black and white schemes, the authors propose a colour (k, n)-VCS and a colour (k, n)-EVCS under the same visual cryptography model, of which the pixel expansions are the same as that of their corresponding black and white (k, n)-VCS and (k, n)-EVCS, respectively. The authors also give the experimental results of the proposed schemes, and compare the proposed scheme with known schemes in the literature.
Analysis of bilinear pairing-based accumulator for identity escrowing
Efficient identity-based signatures in the standard model
Optimum retrieval of watermark from wavelet significant coefficients
Robust audio watermarking using frequency-selective spread spectrum
Colour visual cryptography schemes
Most viewed content for this Journal
Article
content/journals/iet-ifs
Journal
5
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article