DocumentCode :
987506
Title :
Authentication with distortion criteria
Author :
Martinian, Emin ; Wornell, Gregory W. ; Chen, Brian
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Massachusetts Inst. of Technol., Cambridge, MA, USA
Volume :
51
Issue :
7
fYear :
2005
fDate :
7/1/2005 12:00:00 AM
Firstpage :
2523
Lastpage :
2542
Abstract :
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.
Keywords :
combined source-channel coding; cryptography; data encapsulation; digital signatures; distortion; image coding; multimedia communication; telecommunication security; watermarking; associated information-theoretic performance limit; authentication system construction; data hiding; digital signature; digital watermarking; distortion criteria; information embedding; joint source-channel coding; legitimate editing; multimedia security; potential tampering attack; robust hashing; security strict notion; transaction-tracking; Authentication; Data encapsulation; Data security; Digital signatures; Encoding; Information security; Instruments; Robustness; Video compression; Watermarking; Coding with side information; data hiding; digital signatures; digital watermarking; information embedding; joint source–channel coding; multimedia security; robust hashing; tamper-proofing; transaction-tracking;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2005.850123
Filename :
1459056
Link To Document :
بازگشت