Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which...
Saved in:
Main Authors: | GUO, Huiping, LI, Yingjiu, Jajodia, Sushil |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1184 http://dx.doi.org/10.1016/j.ins.2006.03.014 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations
by: GUO, Huiping, et al.
Published: (2006) -
Twenty years of digital audio watermarking—a comprehensive review
by: Hua, Guang, et al.
Published: (2016) -
Tamper detection in the EPC network using digital watermarking
by: HAN, Shui-Hua, et al.
Published: (2011) -
Security in watermarking and authentication of noisy data
by: LI QIMING
Published: (2010) -
An optical watermarking solution for authenticating printed document
by: SUN, Q. B., et al.
Published: (2001)