Information Technology Reference
In-Depth Information
building robust watermarking scheme using the proposed CA based one-way
hash function and extend the scheme to develop a digital signature scheme for
e-commerce application.
References
1. B. Schineier Applied Cryptography tJohn Wiley and Sons, 2001.
2. P.Pal Chaudhuri, D.Roy Choudhury, S. Nandi and S. Chattopadhyay Additive
Cellular Automata Theory and Applications . IEEE Computer Society Press, Cali-
fornia, USA, 1997.
3. S. Wolfram Cryptography with Cellular Automata Proceedings of Crypto'85,
pp.429-432
4. S. Wolfram Cellular Automata and Complexity Addition-Wesly Publishing Com-
pany, 1994
5. T.R.N.RaoandE.Fujiwara Error-control Coding for Computer Systems Prentice-
Hall, Englewood Cliffs, N.J, 1989
6. M. Holliman and N. Memon Counterfeiting Attacks on Oblivious Block-wise In-
dependent Invisible Watermarking Schemes IEEE trans. on Image Processing,
volume-9, No-3, March,2000
7. M. Mukherjee, B.K.S, N. Ganguly and P. Pal Chaudhuri GF( 2 p ) Cellular Au-
tomata As A Message Digest Generator 9 th International Conference on Advance
Computing and Communications, December-2001
8. KPaul,D.RoyChowdhury,P.PalChaudhuri Theory of Extended Linear Machine ,
to be published in IEEE, Transaction on Computers.
9. P. Dasgupta, S. Chattopadhyay and I. Sengupta An ASIC for Cellular Automata
based message Authentication 12 th Int. Conf. on VLSI Design, 1999
10. D. Wagner Differential cryptanalysis of KHF 5th Int. Workshop on Fast Software
Encryption, 1998
11. B. Preneel and P. van Oorschot MD-x MAC and building fast MACs from hash
functions CRYPTO 95 Proceedings, Vol.963, D. Coppersmith ed., Springer-Verlag,
1995.
12. E. Biham and A. Shamir Differential Cryptanalysis of DES-like Cryptosystems
Journal of Cryptology, 4(1991), 3-72
13. J. Fridrich Security of Fragile Authentication Watermarks with Localization Proc.
of SPIE Photonic West, Electro Imaging 2002, Security and Watermarking of Mul-
timedia Contents, January-2002
14. P. W. Wong and N. Memon Secret and Public Key Image Watermarking Schemes
for Image Authentication and ownership verification IEEE trans. on Image Pro-
cessing, volume-10, No-10, October,2001
Search WWH ::




Custom Search