Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications
Data authentication is another common application of digital data, hiding. The authenticity and integrity of protected data are obtained by hiding a fragile signal within them. The fragile signal is such that the hidden data is lost or altered as soon as the host data undergoes any modification: los...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1359 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
Tóm tắt: | Data authentication is another common application of digital data, hiding. The authenticity and integrity of protected data are obtained by hiding a fragile signal within them. The fragile signal is such that the hidden data is lost or altered as soon as the host data undergoes any modification: loss or alteration of the hidden data is ta.ken as an evidence that the host signal has been tampered with, whereas the recovery of the information contained within the data is used to demonstrate data authenticity. In this case, the hidden data can be seen as a kind of trap, since a forger is likely to modify it inadvertently, thus leaving a trace of its action (be it malicious or not). Of course, the need to not alter the quality of t,he host signal is a furt,her motivation behind the willingness to conceal carefully the mthenticating information. |
---|