Information Technology Reference
In-Depth Information
building robust watermarking scheme using the proposed
CA
based one-way
hash function and extend the scheme to develop a digital signature scheme for
e-commerce application.
References
1. B. Schineier
Applied Cryptography
tJohn Wiley and Sons, 2001.
2. P.Pal Chaudhuri, D.Roy Choudhury, S. Nandi and S. Chattopadhyay
Additive
Cellular Automata Theory and Applications
. IEEE Computer Society Press, Cali-
fornia, USA, 1997.
3. S. Wolfram
Cryptography with Cellular Automata
Proceedings of Crypto'85,
pp.429-432
4. S. Wolfram
Cellular Automata and Complexity
Addition-Wesly Publishing Com-
pany, 1994
5. T.R.N.RaoandE.Fujiwara
Error-control Coding for Computer Systems
Prentice-
Hall, Englewood Cliffs, N.J, 1989
6. M. Holliman and N. Memon
Counterfeiting Attacks on Oblivious Block-wise In-
dependent Invisible Watermarking Schemes
IEEE trans. on Image Processing,
volume-9, No-3, March,2000
7. M. Mukherjee, B.K.S, N. Ganguly and P. Pal Chaudhuri
GF(
2
p
) Cellular Au-
tomata As A Message Digest Generator
9 th International Conference on Advance
Computing and Communications, December-2001
8. KPaul,D.RoyChowdhury,P.PalChaudhuri
Theory of Extended Linear Machine
,
to be published in IEEE, Transaction on Computers.
9. P. Dasgupta, S. Chattopadhyay and I. Sengupta
An ASIC for Cellular Automata
based message Authentication
12 th Int. Conf. on VLSI Design, 1999
10. D. Wagner
Differential cryptanalysis of KHF
5th Int. Workshop on Fast Software
Encryption, 1998
11. B. Preneel and P. van Oorschot
MD-x MAC and building fast MACs from hash
functions
CRYPTO 95 Proceedings, Vol.963, D. Coppersmith ed., Springer-Verlag,
1995.
12. E. Biham and A. Shamir
Differential Cryptanalysis of DES-like Cryptosystems
Journal of Cryptology, 4(1991), 3-72
13. J. Fridrich
Security of Fragile Authentication Watermarks with Localization
Proc.
of SPIE Photonic West, Electro Imaging 2002, Security and Watermarking of Mul-
timedia Contents, January-2002
14. P. W. Wong and N. Memon
Secret and Public Key Image Watermarking Schemes
for Image Authentication and ownership verification
IEEE trans. on Image Pro-
cessing, volume-10, No-10, October,2001