Skip to main content

Articles

Page 5 of 5

  1. One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...

    Authors: S.-C. S. Cheung and Thinh Nguyen
    Citation: EURASIP Journal on Information Security 2007 2007:051368
  2. Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...

    Authors: Caroline Fontaine and Fabien Galand
    Citation: EURASIP Journal on Information Security 2007 2007:013801
  3. Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...

    Authors: J. P. Prins, Z. Erkin and R. L. Lagendijk
    Citation: EURASIP Journal on Information Security 2007 2007:031340
  4. This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error r...

    Authors: Michael Gschwandtner, Andreas Uhl and Peter Wild
    Citation: EURASIP Journal on Information Security 2007 2007:048179
  5. The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investiga...

    Authors: A Piva and M Barni
    Citation: EURASIP Journal on Information Security 2007 2007:098684
  6. We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...

    Authors: Enrico Magli, Marco Grangetto and Gabriella Olmo
    Citation: EURASIP Journal on Information Security 2007 2007:079048
  7. A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...

    Authors: Daniel Socek, Spyros Magliveras, Dubravko Ćulibrk, Oge Marques, Hari Kalva and Borko Furht
    Citation: EURASIP Journal on Information Security 2007 2007:052965
  8. The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...

    Authors: C Orlandi, A Piva and M Barni
    Citation: EURASIP Journal on Information Security 2007 2007:037343

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    3.6 - 2-year Impact Factor
    3.6 - 5-year Impact Factor
    1.461 - SNIP (Source Normalized Impact per Paper)
    0.901 - SJR (SCImago Journal Rank)

    2022 Speed
    46 days submission to first editorial decision for all manuscripts (Median)
    236 days submission to accept (Median)

    2022 Usage 
    210,880 downloads
    61 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here