scholarly journals Commitment schemes and diophantine equations

2020 ◽  
Vol 4 (1) ◽  
pp. 1-5
Author(s):  
José Felipe AAAVoloch
2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


1966 ◽  
Vol s3-16 (1) ◽  
pp. 153-166 ◽  
Author(s):  
J. H. E. Cohn

Author(s):  
Behzad Abdolmaleki ◽  
Karim Baghery ◽  
Helger Lipmaa ◽  
Janno Siim ◽  
Michał Zając
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document