Authentication with distortion criteria

IEEE Transactions on Information Theory(2005)

引用 54|浏览1
暂无评分
摘要
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.
更多
查看译文
关键词
gaussian case,distortion criterion,legitimate editing,digital signatures,information embedding,associated system,additional insight,rate-distortion coding,anti-spoong,natural generalization,efficient layered authentication system,classical approach,traitor-tracing,index terms,multimedia,digital watermarking,authentication,traditional authentication,transaction-tracking,associated information-theoretic performance limit,coding with side information,tamper-proong,data hiding,secure computation,digital watermark,robustness,information security,data security,distortion,video compression,information theory,digital signature,indexing terms,cryptography,encoding,watermarking
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要