Mehan, Vineet; Dhir, Renu; Brar, Yadwinder Singh A novel elliptic curve cryptography based approach of re-watermarking for cheque truncation system. (English) Zbl 1495.94061 J. Discrete Math. Sci. Cryptography 18, No. 3, 219-235 (2015). MSC: 94A60 Cryptography 14G50 Applications to coding theory and cryptography of arithmetic geometry Keywords:advanced encryption standard; cheque truncation system; discrete cosine transform; elliptic curve Diffie Hellman protocol; elliptic curve digital signature algorithm; re-watermarking × Cite Format Result Cite Review PDF Full Text: DOI References: [1] Khanapurkar, A.; Nanda, M., High performance image storageretrieval architecture, India Conference (INDICON), 1-10 (2011) [2] Talele, A. K.; Nalbalwar, S. L.; Rane, M. E., Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques, International Journal of Computer Applications, 21, 35-41 (2011) [3] Rafael, P.; Amar, G., A system for processing handwritten bank checks automatically, Image Vision Computing, 26, 1297-1313 (2008) [4] Hong, P.; Hung, L.; Hua, L., A novel fractal image watermarking, IEEE Transactions on Multimedia, 8, 488-499 (2006) [5] Pei-Yu, L.; Jung-San, L.; Chin-Chen, C., Dual Digital Watermarking for Internet Media Based on Hybrid Strategies, IEEE Transactions on Circuits and Systems for Video Technology, 19, 1169-1177 (2009) [6] Yongjian, H.; Byeungwoo, J., Reversible Visible Watermarking and Lossless Recovery of Original Images, IEEE Transactions on Circuits and Systems for Video Technology, 16, 1423-1429 (2006) [7] Karakonstantis, G.; Banerjee, N.; Roy, K., Process-Variation Resilient and Voltage-Scalable DCT Architecture for Robust Low-Power Computing, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18, 1461-1470 (2010) [8] Huang, P. S.; Chiang, C. S.; Chang, C. P.; Tu, T. M., Robust spatial watermarking technique for colour images via direct saturation adjustment, IEE Proceedings -Vision, Image and Signal Processing, 152, 561-574 (2005) [9] Tsz Kin, T.; Xiao-Ping, Z.; Androutsos, D., Color Image Watermarking Using Multidimensional Fourier Transforms, IEEE Transactions on Information Forensics and Security, 3, 16-28 (2008) [10] Jaehwan, J.; Jinhee, L.; Joonki, P., Robust focus measure for unsupervised auto-focusing based on optimum discrete cosine transform coefficients, IEEE Transactions on Consumer Electronics, 57, 1-5 (2011) [11] Xu, J.; Ma, B., Digital watermark for document electronic seal system based on DCT technology, International Conference on Uncertainty Reasoning and Knowledge Engineering (URKE), 5-8 (2011) [12] Singh, S. K.; Kumar, S.; Srivastava, M.; Chandra, A.; Srivastava, S., Wavelet Based Robust Digital Watermarking Technique Using Reverse Additive Algorithm (RAA), Third UKSim European Symposium on Computer Modeling and Simulation, 241-244 (2009) [13] Nicholas Paul, S.; Reihaneh, S.-N.; Philip, O., On multiple watermarking, Proceedings of the 2001 workshop on Multimedia and security: new challenges, 3-6 (2001), ACM [14] Boato, G.; De Natale, F. G. B.; Fontanari, C., Digital Image Tracing by Sequential Multiple Watermarking, IEEE Transactions on Multimedia, 9, 677-686 (2007) [15] Xiaoyu, F.; Hongting, Z.; Hsiao-Chun, W.; Yiyan, W., A New Approach for Optimal Multiple Watermarks Injection, IEEE Signal Processing Letters, 18, 575-578 (2011) [16] Zhou, X. Q.; Huang, H. K.; Lou, S. L., Authenticity and integrity of digital mammography images, IEEE Transactions on Medical Imaging, 20, 784-791 (2001) [17] Samuel, S.; Penzhorn, W. T., Digital watermarking for copyright protection, 7th AFRICON Conference, 953-957 (2004) [18] Xiaoyun, W.; Hongbo, Y., How to break MD5 and other hash functions, Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, 19-35 (2005), Springer-Verlag · Zbl 1137.94359 [19] Xiaoyun, W.; Yiqun Lisa, Y.; Hongbo, Y., Finding collisions in the full SHA-1, Proceedings of the 25th annual international conference on Advances in Cryptology, 17-36 (2005), Springer-Verlag · Zbl 1145.94454 [20] National Institute of Standards and Technology, Secure Hash Standard (SHA), FIPS PUB 180-4 (2012) [21] Gueron, S.; Johnson, S.; Walker, J., SHA-512/256, Eighth International Conference on Information Technology: New Generations (ITNG), 354-358 (2011) [22] Khali, H.; Mehdi, R.; Araar, A., A system-level architecture for hash message authentication code, IEEE International Conference on Electronics, Circuits and Systems, 1-4 (2005) [23] Satoh, A.; Inoue, T., ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS, International Conference on Information Technology: Coding and Computing, 532-537 (2005) [24] Li, H.-Q.; Miao, C.-y., Hardware Implementation of Hash Function SHA-512, International Conference on Innovative Computing, Information and Control, 38-42 (2006) [25] National Institute of Standards and Technology, DIGITAL SIGNATURE STANDARD (DSS), FIPS PUB 186-2 (2000) [26] Hong-Bin, Z.; Cheng, Y.; Xiao-Mei, Q., Image authentication based on digital signature and semi-fragile watermarking, Journal of Computer Science & Technology, 19, 752-759 (2004) [27] Deng, J.-z.; Cheng, X.-h.; Gui, Q., Design of Hyper Elliptic Curve Digital Signature, International Conference on Information Technology and Computer Science, 45-47 (2009) [28] Nabil, G.; Naziha, K.; Lamia, F.; Lotfi, K., Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves, International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), 1-6 (2012) [29] Ying, Q.; Chengxia, L.; ShouZhi, X., A fast ECC digital signature based on DSP, International Conference on Computer Application and System Modeling (ICCASM), 783-786 (2010) [30] Yong-Dong, Z.; Sheng, T.; Jin-Tao, L., Secure and incidental distortion tolerant digital signature for image authentication, Journal of Computer Science & Technology, 22, 618-625 (2007) [31] Nenadic, A.; Ning, Z.; Qi, S.; Goble, C., Certified e-mail delivery with DSA receipts, IEEE International Parallel and Distributed Processing Symposium, 1-8 (2005) [32] Saad, S. M., Design of a robust and secure digital signature scheme for image authentication over wireless channels, IET Information Security, 3, 1-8 (2009) [33] Zhang, Y.; Zhou, W., An ECDSA signature scheme designs for PBOC 2.0 specifications, 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2106-2110 (2012) [34] Xue, S.; Mingping, X., An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography, International Conference on Computer and Communications Security, 88-91 (2009) [35] Schmidt, J.; Medwed, M., A Fault Attack on ECDSA, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99 (2009) [36] Manvi, S. S.; Kakkasageri, M. S.; Adiga, D. G., Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach, International Conference on Future Computer and Communication, 16-20 (2009) [37] Komathy, K.; Narayanasamy, P., Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks, International Multi-Conference on Computing in the Global Information Technology, 61-64 (2006) [38] Hongqi, X.; Qiuxia, Z.; Guoli, K., Broadcasting multi-digital signature algorithm based on the Elliptic Curve cryptosystem, IEEE Symposium on Electrical & Electronics Engineering (EEESYM), 567-569 (2012) [39] Yun, C.; Xin, C.; Yi, M., A Parallel Key Generation Algorithm for Efficient Diffie-Hellman Key Agreement, International Conference on Computational Intelligence and Security, 1393-1395 (2006) [40] Strangio, M. A., Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves, Proceedings of 20th ACM Symposium on Applied Computing (SAC), 324-331 (2005) [41] Singh, A.; Rishi, R., A Novel Approach towards Mutual Authentication and Key Exchange Protocol Based on Elliptic Curve, Second International Conference on Advanced Computing & Communication Technologies (ACCT), 404-408 (2012) [42] Chia-Hui, W.; Yu-Shun, L., A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes, Journal of Network and Computer Application, 34, 1545-1556 (2011) [43] Eun-Jun, Y.; Kee-Young, Y., A new elliptic curve diffie-hellman two-party key agreement protocol, 7th International Conference on Service Systems and Service Management (ICSSSM), 1-4 (2010) [44] Harn, L.; Hsin, W. J.; Mehta, M., Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption, IEE Proceedings- Communications, 152, 404-410 (2005) [45] Shengbao, W.; Zhenfu, C.; Strangio, M. A.; Lihua, W., Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol, IEEE Communications Letters, 12, 149-151 (2008) [46] Tang, H.; Zhu, L.; Zhang, Z., A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman, 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1-4 (2008) [47] National Institute of Standards and Technology, “ADVANCED ENCRYPTION STANDARD,”, 197 (2001), F. I. P. S. Publication [48] Brown, J. A.; Houghten, S.; Ombuki-Berman, B., Genetic algorithm cryptanalysis of a substitution permutation network, IEEE Symposium on Computational Intelligence in Cyber Security, 115-121 (2009) [49] Rhee, M., Mobile Communication Systems and Security, “Advanced Encryption Standard and Elliptic Curve Cryptosystems,”, 341-386 (2009), Wiley-IEEE Press [50] Heron, S., Advanced Encryption Standard (AES), Network Security., 12, 8-12 (2009) [51] Burr, W. E., Selecting the Advanced Encryption Standard, IEEE Security & Privacy, 1, 43-52 (2003) [52] Seshadrinathan, M.; Dempski, K. L., Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 1-6 (2008) [53] Kamali, S. H.; Shakerian, R.; Hedayati, M.; Rahmani, M., A new modified version of Advanced Encryption Standard based algorithm for image encryption, International Conference on Electronics and Information Engineering (ICEIE), 1141-V1145 (2010) [54] Kilts, S., Advanced FPGA Design: Architecture, Implementation, and Optimization, “Example Design: The Advanced Encryption Standard,”, 47-68 (2007), Wiley-IEEE Press [55] Shtewi, A. A.; Hasan, B. E. M.; Fatah, A. E.; Hegazy, A., An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems, International Journal of Computer Science and Network Security, 10, 226-232 (2010) [56] Phan, R. C. W., Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES), Information Processing Letters, 91, 33-38 (2004) · Zbl 1177.68087 [57] ElBadawy, E. S. A. M.; Mokhtar, A.; El-Masry, W. A.; Hafez, A. E. S., A new chaos Advanced Encryption Standard (AES) algorithm for data security, International Conference on Signals and Electronic Systems (ICSES), 405-408 (2010) [58] Ko-Ming, C.; Long-Wen, C., A novel public watermarking system based on advanced encryption system, 18th International Conference on Advanced Information Networking and Applications, 48-52 (2004) [59] Lin, Z.; Fengyong, Q.; Yi, G.; Yuesheng, Z., A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking, International Colloquium on Computing, Communication, Control, and Management, 312-316 (2008) [60] Xiang, L.; Junli, C.; Dinghu, Q.; Wanggen, W., Research and realization based on hybrid encryption algorithm of improved AES and ECC, International Conference on Audio Language and Image Processing (ICALIP), 396-400 (2010) This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.