Authentication With Distortion Criteria

From MaRDI portal
Publication:3547331

DOI10.1109/TIT.2005.850123zbMATH Open1310.94179arXivcs/0503027OpenAlexW2127007120MaRDI QIDQ3547331FDOQ3547331


Authors:


Publication date: 21 December 2008

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Abstract: In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks. We develop one formulation of this problem based on a strict notion of security, and characterize and interpret the associated information-theoretic performance limits. The results can be viewed as a natural generalization of classical approaches to traditional authentication. Additional insights into the structure of such systems and their behavior are obtained by further specializing the results to Bernoulli and Gaussian cases. The associated systems are shown to be substantially better in terms of performance and/or security than commonly advocated approaches based on data hiding and digital watermarking. Finally, the formulation is extended to obtain efficient layered authentication system constructions.


Full work available at URL: https://arxiv.org/abs/cs/0503027




Recommendations




Cited In (1)





This page was built for publication: Authentication With Distortion Criteria

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3547331)