conspiracy attack
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 4)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Chunlin Song ◽  
Hong Wang ◽  
Wei Zhang ◽  
Sud Sudirman ◽  
Haogang Zhu

Background: With the development and innovation of digital information technologies and new-generation Internet information platforms, new types of information exchange methods have been spawned. It has broken the restriction of the traditional internet boundary, and integrated all round connections between people and objects. Methods: Based on the above progresses, digital multimedia contents distributed or published much more convenient on the internet than before and most of them without any copyright protection. The dishonest owner can easily copy and distribute digital multimedia content without reducing any perceptual quality. According to the relative concerns, watermark protocol networks play a very important role in the usage tracking and copyrights infringement authentication, etc. However, most of the watermark protocols always require a “fully trusted third party”, which has a potential risk to suffer conspiracy attack. Results: Therefore, in this paper, we focus on designing a watermark protocol with trustless third party via blockchain for protecting copyrights of owners that they want to publish or distribute on the internet. The proposed watermark protocol includes three sub-protocols which covers the negotiation process, transaction process and identification processes. Conclusion: In addition, this paper also provides a fully detail analysis that describes the benefits and weaknesses of current solution.


Cryptography ◽  
2020 ◽  
pp. 373-390
Author(s):  
Mahinder Pal Singh Bhatia ◽  
Manjot Kaur Bhatia ◽  
Sunil Kumar Muttoo

Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.


2019 ◽  
Vol 17 (3) ◽  
pp. 300
Author(s):  
Xiaoping Wang ◽  
Zhenhu Ning ◽  
Wei Wang ◽  
Yongli Yang

2019 ◽  
Vol 17 (3) ◽  
pp. 300
Author(s):  
Yongli Yang ◽  
Wei Wang ◽  
Xiaoping Wang ◽  
Zhenhu Ning

2015 ◽  
Vol 9 (4) ◽  
pp. 59-76
Author(s):  
Mahinder Pal Singh Bhatia ◽  
Manjot Kaur Bhatia ◽  
Sunil Kumar Muttoo

Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.


2014 ◽  
Vol 8 (6) ◽  
pp. 3027-3032
Author(s):  
Yu-Fang Chung ◽  
Tzer-Shyong Chen ◽  
Tzer-Long Chen

Sign in / Sign up

Export Citation Format

Share Document