By Topic

IET Information Security

Issue 4 • Date December 2008

Filter Results

Displaying Results 1 - 5 of 5
  • Analysis of bilinear pairing-based accumulator for identity escrowing

    Publication Year: 2008, Page(s):99 - 107
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (199 KB)

    An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with mem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient identity-based signatures in the standard model

    Publication Year: 2008, Page(s):108 - 118
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (211 KB)

    The authors describe signature constructions in the standard model based on the hardness of the computational Diffie-Hellman problem over gap and co-gap groups. The schemes are computationally efficient and have reduced public parameter size when compared with other identity-based signatures in the standard model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum retrieval of watermark from wavelet significant coefficients

    Publication Year: 2008, Page(s):119 - 128
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (736 KB)

    Watermark retrieval in wavelet domain has been proved to be more robust from significant coefficients than high absolute coefficients when a single copy of the watermark is embedded in the original data. The highest absolute coefficients refer to the coefficients with the highest absolute values in any selected band and significant coefficients refer to the coefficients with the highest significan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust audio watermarking using frequency-selective spread spectrum

    Publication Year: 2008, Page(s):129 - 150
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1213 KB)

    A novel audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique is presented. Unlike most of the existing spread spectrum (SS) watermarking schemes that use the entire audible frequency range for watermark embedding, the proposed scheme randomly selects subband(s) signal(s) of the host audio signal for watermark embedding. The proposed FSSS scheme provides a natural... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Colour visual cryptography schemes

    Publication Year: 2008, Page(s):151 - 165
    Cited by:  Papers (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (808 KB)

    Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting research topic after the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org