scholarly journals Blockchain-based multimedia security

Keyword(s):  
Author(s):  
Guorui Feng ◽  
Sheng Li ◽  
Haoliang Li ◽  
Shujun Li

Author(s):  
Leo Yu Zhang ◽  
Kai Zeng
Keyword(s):  

2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Imran Shahzad ◽  
Qaiser Mushtaq ◽  
Abdul Razaq

Substitution box (S-box) is a vital nonlinear component for the security of cryptographic schemes. In this paper, a new technique which involves coset diagrams for the action of a quotient of the modular group on the projective line over the finite field is proposed for construction of an S-box. It is constructed by selecting vertices of the coset diagram in a special manner. A useful transformation involving Fibonacci sequence is also used in selecting the vertices of the coset diagram. Finally, all the analyses to examine the security strength are performed. The outcomes of the analyses are encouraging and show that the generated S-box is highly secure.


Author(s):  
Shiguo Lian

Digital fingerprinting is reported and used in copy tracing. It embeds different information, for example, Customer ID, into multimedia content, produces a different copy, and sends the copy to the corresponding customer. If a copy is spread to unauthorized customers, the unique information in the copy can be detected and used to trace the illegal distributors. In this chapter, we introduce some digital fingerprinting algorithms, review the existing traitor tracing schemes, analyze the performances of some typical algorithms through comparison, and propose the future trends and some open issues in this field. It is expected to provide some valuable information to researchers or engineers working in mobile multimedia security.


2006 ◽  
Vol 1 (4) ◽  
pp. 405-420 ◽  
Author(s):  
Renato Villan ◽  
Sviatoslav Voloshynovskiy ◽  
Oleksiy Koval ◽  
Thierry Pun

Sign in / Sign up

Export Citation Format

Share Document