Authentication with Distortion Criteria

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

22 pages, 10 figures

Scientific paper

In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Authentication with Distortion Criteria does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Authentication with Distortion Criteria, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication with Distortion Criteria will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-429033

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.