Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain
暂无分享,去创建一个
Nalini Ratha | Karthik Nandakumar | Sharathchandra Pankanti | N. Ratha | S. Pankanti | Karthik Nandakumar
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[3] Vitaly Shmatikov,et al. Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.
[4] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[5] Hugo Krawczyk,et al. Chameleon Signatures , 2000, NDSS.
[6] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[7] A.H. Tewfik,et al. When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.
[8] Henrich Christopher Pöhls,et al. Non-interactive Public Accountability for Sanitizable Signatures , 2012, EuroPKI.
[9] Marc Fischlin,et al. Redactable Graph Hashing , Revisited , 2017 .
[10] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[11] Bela Gipp,et al. Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain , 2016, MCIS.
[12] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[13] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[14] E M Van Buskirk,et al. When seeing isn't believing. , 1997, Journal of glaucoma.
[15] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[16] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[17] Eran Tromer,et al. PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[18] Touradj Ebrahimi,et al. PEViD: privacy evaluation video dataset , 2013, Optics & Photonics - Optical Engineering + Applications.
[19] Kun He,et al. MIHash: Online Hashing with Mutual Information , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[20] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[21] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[22] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[23] Douglas M. Blough,et al. Verifiable and Redactable Medical Documents , 2012, AMIA.
[24] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[25] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[26] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[27] Mahmudur Rahman,et al. Video Liveness for Citizen Journalism: Attacks and Defenses , 2017, IEEE Transactions on Mobile Computing.