28
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Novel Elliptic Curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System

, &
Pages 219-235 | Received 01 Aug 2013, Published online: 02 Jun 2015

References

  • A. Khanapurkar and M. Nanda, “High performance image storageretrieval architecture,” in India Conference (INDICON), 2011, pp. 1–10.
  • A. K. Talele, S. L. Nalbalwar, and M. E. Rane, “Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques,” International Journal of Computer Applications, vol.21, pp. 35–41, 2011.
  • P. Rafael and G. Amar, “A system for processing handwritten bank checks automatically,” Image Vision Computing, vol. 26, pp. 1297–1313, 2008.
  • P. Hong, L. Hung, and L. Hua, “A novel fractal image watermarking,” IEEE Transactions on Multimedia, vol.8, pp. 488–499, 2006.
  • L. Pei-Yu, L. Jung-San, and C. Chin-Chen, “Dual Digital Watermarking for Internet Media Based on Hybrid Strategies,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1169–1177, 2009.
  • H. Yongjian and J. Byeungwoo, “Reversible Visible Watermarking and Lossless Recovery of Original Images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 1423–1429, 2006.
  • G. Karakonstantis, N. Banerjee, and K. Roy, “Process-Variation Resilient and Voltage-Scalable DCT Architecture for Robust Low-Power Computing,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 18, pp. 1461–1470, 2010.
  • P. S. Huang, C. S. Chiang, C. P. Chang, and T. M. Tu, “Robust spatial watermarking technique for colour images via direct saturation adjustment,” IEE Proceedings -Vision, Image and Signal Processing, vol. 152, pp. 561–574, 2005.
  • T. Tsz Kin, Z. Xiao-Ping, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 16–28, 2008.
  • J. Jaehwan, L. Jinhee, and P. Joonki, “Robust focus measure for unsupervised auto-focusing based on optimum discrete cosine transform coefficients,” IEEE Transactions on Consumer Electronics, vol. 57, pp. 1–5, 2011.
  • J. Xu and B. Ma, “Digital watermark for document electronic seal system based on DCT technology,” in International Conference on Uncertainty Reasoning and Knowledge Engineering (URKE), 2011, pp. 5–8.
  • S. K. Singh, S. Kumar, M. Srivastava, A. Chandra, and S. Srivastava, “Wavelet Based Robust Digital Watermarking Technique Using Reverse Additive Algorithm (RAA),” in Third UKSim European Symposium on Computer Modeling and Simulation, 2009, pp. 241–244.
  • S. Nicholas Paul, S.-N. Reihaneh, and O. Philip, “On multiple watermarking,” in Proceedings of the 2001 workshop on Multimedia and security: new challenges Ottawa, Ontario, Canada: ACM, 2001, pp. 3–6.
  • G. Boato, F. G. B. De Natale, and C. Fontanari, “Digital Image Tracing by Sequential Multiple Watermarking,” IEEE Transactions on Multimedia, vol. 9, pp. 677–686, 2007.
  • F. Xiaoyu, Z. Hongting, W. Hsiao-Chun, and W. Yiyan, “A New Approach for Optimal Multiple Watermarks Injection,” IEEE Signal Processing Letters, vol. 18, pp. 575–578, 2011.
  • X. Q. Zhou, H. K. Huang, and S. L. Lou, “Authenticity and integrity of digital mammography images,” IEEE Transactions on Medical Imaging, vol. 20, pp. 784–791, 2001.
  • S. Samuel and W. T. Penzhorn, “Digital watermarking for copyright protection,” in 7th AFRICON Conference 2004, pp. 953–957.
  • W. Xiaoyun and Y. Hongbo, “How to break MD5 and other hash functions,” in Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques Aarhus, Denmark: Springer-Verlag, 2005, pp. 19–35.
  • W. Xiaoyun, Y. Yiqun Lisa, and Y. Hongbo, “Finding collisions in the full SHA-1,” in Proceedings of the 25th annual international conference on Advances in Cryptology Santa Barbara, California: Springer-Verlag, 2005, pp. 17–36.
  • National Institute of Standards and Technology, “Secure Hash Standard (SHA),” in FIPS PUB 180-4, 2012.
  • S. Gueron, S. Johnson, and J. Walker, “SHA-512/256,” in Eighth International Conference on Information Technology: New Generations (ITNG), 2011, pp. 354–358.
  • H. Khali, R. Mehdi, and A. Araar, “A system-level architecture for hash message authentication code,” in IEEE International Conference on Electronics, Circuits and Systems, 2005, pp. 1–4.
  • A. Satoh and T. Inoue, “ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS,” in International Conference on Information Technology: Coding and Computing, 2005, pp. 532–537.
  • H.-Q. Li and C.-y. Miao, “Hardware Implementation of Hash Function SHA-512,” in International Conference on Innovative Computing, Information and Control 2006, pp. 38–42.
  • National Institute of Standards and Technology, “DIGITAL SIGNATURE STANDARD (DSS),” in FIPS PUB 186-2, 2000.
  • Z. Hong-Bin, Y. Cheng, and Q. Xiao-Mei, “Image authentication based on digital signature and semi-fragile watermarking,” Journal of Computer Science & Technology, vol. 19, pp. 752–759, 2004.
  • J.-z. Deng, X.-h. Cheng, and Q. Gui, “Design of Hyper Elliptic Curve Digital Signature,” in International Conference on Information Technology and Computer Science, 2009, pp. 45–47.
  • G. Nabil, K. Naziha, F. Lamia, and K. Lotfi, “Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves,” in International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012, pp. 1–6.
  • Q. Ying, L. Chengxia, and X. ShouZhi, “A fast ECC digital signature based on DSP,” in International Conference on Computer Application and System Modeling (ICCASM), 2010, pp. V783–V786.
  • Z. Yong-Dong, T. Sheng, and L. Jin-Tao, “Secure and incidental distortion tolerant digital signature for image authentication,” Journal of Computer Science & Technology, vol. 22, pp. 618–625, 2007.
  • A. Nenadic, Z. Ning, S. Qi, and C. Goble, “Certified e-mail delivery with DSA receipts,” in IEEE International Parallel and Distributed Processing Symposium, 2005, pp. 1–8.
  • S. M. Saad, “Design of a robust and secure digital signature scheme for image authentication over wireless channels,” IET Information Security, vol. 3, pp. 1–8, 2009.
  • Y. Zhang and W. Zhou, “An ECDSA signature scheme designs for PBOC 2.0 specifications,” in 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) 2012, pp. 2106–2110.
  • S. Xue and X. Mingping, “An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography,” in International Conference on Computer and Communications Security, 2009, pp. 88–91.
  • J. Schmidt and M. Medwed, “A Fault Attack on ECDSA,” in Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2009, pp. 93–99.
  • S. S. Manvi, M. S. Kakkasageri, and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach,” in International Conference on Future Computer and Communication, 2009, pp. 16–20.
  • K. Komathy and P. Narayanasamy, “Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks,” in International Multi-Conference on Computing in the Global Information Technology, 2006, pp. 61–64.
  • X. Hongqi, Z. Qiuxia, and K. Guoli, “Broadcasting multi-digital signature algorithm based on the Elliptic Curve cryptosystem,” in IEEE Symposium on Electrical & Electronics Engineering (EEESYM) 2012, pp. 567–569.
  • C. Yun, C. Xin, and M. Yi, “A Parallel Key Generation Algorithm for Efficient Diffie-Hellman Key Agreement,” in International Conference on Computational Intelligence and Security, 2006, pp. 1393–1395.
  • M. A. Strangio, “Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves,” in Proceedings of 20th ACM Symposium on Applied Computing (SAC), 2005, pp. 324–331.
  • A. Singh and R. Rishi, “A Novel Approach towards Mutual Authentication and Key Exchange Protocol Based on Elliptic Curve,” in Second International Conference on Advanced Computing & Communication Technologies (ACCT), 2012 pp. 404–408.
  • W. Chia-Hui and L. Yu-Shun, “A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes,” Journal of Network and Computer Application, vol. 34, pp. 1545–1556, 2011.
  • Y. Eun-Jun and Y. Kee-Young, “A new elliptic curve diffie-hellman two-party key agreement protocol,” in 7th International Conference on Service Systems and Service Management (ICSSSM), 2010, pp. 1–4.
  • L. Harn, W. J. Hsin, and M. Mehta, “Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption,” IEE Proceedings- Communications, vol. 152, pp. 404–410, 2005.
  • W. Shengbao, C. Zhenfu, M. A. Strangio, and W. Lihua, “Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol,” IEEE Communications Letters, vol. 12, pp. 149–151, 2008.
  • H. Tang, L. Zhu, and Z. Zhang, “A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman,” in 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp. 1–4.
  • National Institute of Standards and Technology, “ADVANCED ENCRYPTION STANDARD,” in F. I. P. S. Publication 197, 2001.
  • J. A. Brown, S. Houghten, and B. Ombuki-Berman, “Genetic algorithm cryptanalysis of a substitution permutation network,” in IEEE Symposium on Computational Intelligence in Cyber Security, 2009, pp. 115–121.
  • M. Rhee, “Advanced Encryption Standard and Elliptic Curve Cryptosystems,” in Mobile Communication Systems and Security Wiley-IEEE Press, 2009, pp. 341–386.
  • S. Heron, “Advanced Encryption Standard (AES),” in Network Security. vol. 12, 2009, pp. 8–12.
  • W. E. Burr, “Selecting the Advanced Encryption Standard,” IEEE Security & Privacy, vol. 1, pp. 43–52, 2003.
  • M. Seshadrinathan and K. L. Dempski, “Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,” in IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2008, pp. 1–6.
  • S. H. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified version of Advanced Encryption Standard based algorithm for image encryption,” in International Conference on Electronics and Information Engineering (ICEIE), 2010 pp. V1141–V1145.
  • S. Kilts, “Example Design: The Advanced Encryption Standard,” in Advanced FPGA Design: Architecture, Implementation, and Optimization: Wiley-IEEE Press, 2007, pp. 47–68.
  • A. A. Shtewi, B. E. M. Hasan, A. E. Fatah, and A. Hegazy., “An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems,” International Journal of Computer Science and Network Security, vol. 10, pp. 226–232, 2010.
  • R. C. W. Phan, “Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES),” Information Processing Letters, vol. 91, pp. 33–38, 2004.
  • E. S. A. M. ElBadawy, A. Mokhtar, W. A. El-Masry, and A. E. S. Hafez, “A new chaos Advanced Encryption Standard (AES) algorithm for data security,” in International Conference on Signals and Electronic Systems (ICSES), 2010 pp. 405–408.
  • C. Ko-Ming and C. Long-Wen, “A novel public watermarking system based on advanced encryption system,” in 18th International Conference on Advanced Information Networking and Applications, 2004, pp. 48–52.
  • Z. Lin, Q. Fengyong, G. Yi, and Z. Yuesheng, “A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking,” in International Colloquium on Computing, Communication, Control, and Management, 2008, pp. 312–316.
  • L. Xiang, C. Junli, Q. Dinghu, and W. Wanggen, “Research and realization based on hybrid encryption algorithm of improved AES and ECC,” in International Conference on Audio Language and Image Processing (ICALIP), 2010 pp. 396–400.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.