Hash-Tree Anti-Tampering Schemes
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes. The main problems of constructing such a scheme are its computational fea...
| Main Authors: | Moss, Ben, Ashman, Helen |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2002
|
| Online Access: | https://eprints.nottingham.ac.uk/296/ |
Similar Items
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability
by: Khor, Hui Liang, et al.
Published: (2014)
by: Khor, Hui Liang, et al.
Published: (2014)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
by: Chee, Kong Yik
Published: (2018)
by: Chee, Kong Yik
Published: (2018)
Region of interest-based tamper detection and lossless recovery watermarking scheme on MRI and X-ray medical images
by: Ooi, Jessie, et al.
Published: (2020)
by: Ooi, Jessie, et al.
Published: (2020)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
RIPEMD and Chameleon hash function
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Reversible Medical Image Watermarking for Tamper Detection and Recovery
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
The Usage of Block Average Intensity in Tamper Localization for Image Watermarking
by: Liew, Siau-Chuin, et al.
Published: (2011)
by: Liew, Siau-Chuin, et al.
Published: (2011)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Biometric hash: high-confidence face recognition
by: Ngo, D.C.L., et al.
Published: (2006)
by: Ngo, D.C.L., et al.
Published: (2006)
A Fast Incremental Cryptographic Hash Function
by: Goi , Bok Min
Published: (2003)
by: Goi , Bok Min
Published: (2003)
A Fast Incremental Cryptographic Hash Function
by: Goi, Bok Min
Published: (2003)
by: Goi, Bok Min
Published: (2003)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Evaluation of medical image watermarking with Tamper Detection
and Recovery (AW-TDR)
by: Mohamad Zain, Jasni, et al.
Published: (2007)
by: Mohamad Zain, Jasni, et al.
Published: (2007)
The role of the rule “No Ijtihad in The Presence of a Text” in preventing tampering with the text
by: Abdikadir, Ahmed Mahmoud, et al.
Published: (2023)
by: Abdikadir, Ahmed Mahmoud, et al.
Published: (2023)
The role of the rule “no ijtihad in the presence of a text” in preventing tampering with the text
by: Abdikadir, Ahmed Mahmoud, et al.
Published: (2023)
by: Abdikadir, Ahmed Mahmoud, et al.
Published: (2023)
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
Experiment of Tamper Detection and Recovery Watermarking in
Picture Archiving and Communication Systems
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
A new multi-frames watermarking technique for tamper detection and recovery
by: Khor, Hui Liang
Published: (2017)
by: Khor, Hui Liang
Published: (2017)
New Directions in Commercial Secrecy and Encryption Protocols
by: Ashman, Helen
Published: (2001)
by: Ashman, Helen
Published: (2001)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Similar Items
-
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013) -
A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability
by: Khor, Hui Liang, et al.
Published: (2014) -
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)