Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be w...
| Main Authors: | Ling, Huo-Chong, Heng, Swee-Huay, Phan, Raphael C.-W. |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3193/ |
Similar Items
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
A survey of network protocol based steganographic techniques
by: Abdullaziz, O., et al.
Published: (2014)
by: Abdullaziz, O., et al.
Published: (2014)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
Blind signature / Musfirah Mohd Ali
by: Musfirah, Mohd Ali
Published: (2005)
by: Musfirah, Mohd Ali
Published: (2005)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
AIPISteg: An active IP identification based steganographic method
by: Abdullaziz, O., et al.
Published: (2016)
by: Abdullaziz, O., et al.
Published: (2016)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
On an optimal robust digital image watermarking based on SVD using differential evolution algorithm
by: Ling, Huo-Chong, et al.
Published: (2011)
by: Ling, Huo-Chong, et al.
Published: (2011)
An efficient CSMA/CA protocol for IEEE 802.11
by: Hussein Abbas, Ali Muhammad
Published: (2018)
by: Hussein Abbas, Ali Muhammad
Published: (2018)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Path selection protocols for IEEE 802.11s wlan mesh
networks
by: Bari, S. M. Sadakatil, et al.
Published: (2011)
by: Bari, S. M. Sadakatil, et al.
Published: (2011)
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
Comparative study of different steganographic techniques
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Work Placement for International Student Programmes (WISP): A Model of Effective Practice
by: Barton, G., et al.
Published: (2017)
by: Barton, G., et al.
Published: (2017)
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006)
by: Ogata, Wakaha, et al.
Published: (2006)
Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
by: Khong, Johnson
Published: (2018)
by: Khong, Johnson
Published: (2018)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Adapting web images for blind people
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Tagging web images for blind users.
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
Enhance route discovery Ad hoc On-demand Distance Vector (ERDA) protocol for black hole attack mitigation / Zaid Ahmad
by: Ahmad, Zaid
Published: (2014)
by: Ahmad, Zaid
Published: (2014)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
Similar Items
-
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008) -
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007) -
A survey of network protocol based steganographic techniques
by: Abdullaziz, O., et al.
Published: (2014) -
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005) -
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)