Title :
Authentication with distortion criteria
Author :
Martinian, Emin ; Wornell, Gregory W. ; Chen, Brian
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Massachusetts Inst. of Technol., Cambridge, MA, USA
fDate :
7/1/2005 12:00:00 AM
Abstract :
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.
Keywords :
combined source-channel coding; cryptography; data encapsulation; digital signatures; distortion; image coding; multimedia communication; telecommunication security; watermarking; associated information-theoretic performance limit; authentication system construction; data hiding; digital signature; digital watermarking; distortion criteria; information embedding; joint source-channel coding; legitimate editing; multimedia security; potential tampering attack; robust hashing; security strict notion; transaction-tracking; Authentication; Data encapsulation; Data security; Digital signatures; Encoding; Information security; Instruments; Robustness; Video compression; Watermarking; Coding with side information; data hiding; digital signatures; digital watermarking; information embedding; joint source–channel coding; multimedia security; robust hashing; tamper-proofing; transaction-tracking;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2005.850123