Skip to main content

Advertisement

Articles

Page 4 of 4

  1. JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security an...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2008 2007:094565

    Content type: Research Article

    Published on:

  2. Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensit...

    Authors: Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González

    Citation: EURASIP Journal on Information Security 2008 2007:045731

    Content type: Research Article

    Published on:

  3. An objective performance measure is proposed to evaluate the intelligibility of a speech signal having its frequency subbands permuted. The proposed tool can be used to generate efficient keys for frequency do...

    Authors: AMCR Borzino, JA Apolinário Jr. and DG da Silva

    Citation: EURASIP Journal on Information Security 2008 2007:032028

    Content type: Research Article

    Published on:

  4. From December 15, 2005 to June 15, 2006, the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the peak signal-to-noise ratio (PSNR) measur...

    Authors: Pedro Comesaña and Fernando Pérez-González

    Citation: EURASIP Journal on Information Security 2007 2007:025308

    Content type: Research Article

    Published on:

  5. Multimedia fingerprinting, also known as robust or perceptual hashing, aims at representing multimedia signals through compact and perceptually significant descriptors (hash values). In this paper, we examine ...

    Authors: Neil J. Hurley, Félix Balado and Guénolé C. M. Silvestre

    Citation: EURASIP Journal on Information Security 2007 2008:195238

    Content type: Research Article

    Published on:

  6. One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...

    Authors: S.-C. S. Cheung and Thinh Nguyen

    Citation: EURASIP Journal on Information Security 2007 2007:051368

    Content type: Research Article

    Published on:

  7. The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in t...

    Authors: Scott Craver, Idris Atakli and Jun Yu

    Citation: EURASIP Journal on Information Security 2007 2007:043034

    Content type: Research Article

    Published on:

  8. Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...

    Authors: Caroline Fontaine and Fabien Galand

    Citation: EURASIP Journal on Information Security 2007 2007:013801

    Content type: Review Article

    Published on:

  9. Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...

    Authors: J. P. Prins, Z. Erkin and R. L. Lagendijk

    Citation: EURASIP Journal on Information Security 2007 2007:031340

    Content type: Research Article

    Published on:

  10. This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error r...

    Authors: Michael Gschwandtner, Andreas Uhl and Peter Wild

    Citation: EURASIP Journal on Information Security 2007 2007:048179

    Content type: Research Article

    Published on:

  11. The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investiga...

    Authors: A Piva and M Barni

    Citation: EURASIP Journal on Information Security 2007 2007:098684

    Content type: Research Article

    Published on:

  12. We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...

    Authors: Enrico Magli, Marco Grangetto and Gabriella Olmo

    Citation: EURASIP Journal on Information Security 2007 2007:079048

    Content type: Research Article

    Published on:

  13. A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...

    Authors: Daniel Socek, Spyros Magliveras, Dubravko Ćulibrk, Oge Marques, Hari Kalva and Borko Furht

    Citation: EURASIP Journal on Information Security 2007 2007:052965

    Content type: Research Article

    Published on:

  14. The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...

    Authors: C Orlandi, A Piva and M Barni

    Citation: EURASIP Journal on Information Security 2007 2007:037343

    Content type: Research Article

    Published on:

Latest Tweets

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here


Advertisement