The use of secret-key techniques in forward information verification | IEEE Conference Publication | IEEE Xplore