References
- A. Khanapurkar and M. Nanda, “High performance image storageretrieval architecture,” in India Conference (INDICON), 2011, pp. 1–10.
- A. K. Talele, S. L. Nalbalwar, and M. E. Rane, “Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques,” International Journal of Computer Applications, vol.21, pp. 35–41, 2011.
- P. Rafael and G. Amar, “A system for processing handwritten bank checks automatically,” Image Vision Computing, vol. 26, pp. 1297–1313, 2008.
- P. Hong, L. Hung, and L. Hua, “A novel fractal image watermarking,” IEEE Transactions on Multimedia, vol.8, pp. 488–499, 2006.
- L. Pei-Yu, L. Jung-San, and C. Chin-Chen, “Dual Digital Watermarking for Internet Media Based on Hybrid Strategies,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1169–1177, 2009.
- H. Yongjian and J. Byeungwoo, “Reversible Visible Watermarking and Lossless Recovery of Original Images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 1423–1429, 2006.
- G. Karakonstantis, N. Banerjee, and K. Roy, “Process-Variation Resilient and Voltage-Scalable DCT Architecture for Robust Low-Power Computing,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 18, pp. 1461–1470, 2010.
- P. S. Huang, C. S. Chiang, C. P. Chang, and T. M. Tu, “Robust spatial watermarking technique for colour images via direct saturation adjustment,” IEE Proceedings -Vision, Image and Signal Processing, vol. 152, pp. 561–574, 2005.
- T. Tsz Kin, Z. Xiao-Ping, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 16–28, 2008.
- J. Jaehwan, L. Jinhee, and P. Joonki, “Robust focus measure for unsupervised auto-focusing based on optimum discrete cosine transform coefficients,” IEEE Transactions on Consumer Electronics, vol. 57, pp. 1–5, 2011.
- J. Xu and B. Ma, “Digital watermark for document electronic seal system based on DCT technology,” in International Conference on Uncertainty Reasoning and Knowledge Engineering (URKE), 2011, pp. 5–8.
- S. K. Singh, S. Kumar, M. Srivastava, A. Chandra, and S. Srivastava, “Wavelet Based Robust Digital Watermarking Technique Using Reverse Additive Algorithm (RAA),” in Third UKSim European Symposium on Computer Modeling and Simulation, 2009, pp. 241–244.
- S. Nicholas Paul, S.-N. Reihaneh, and O. Philip, “On multiple watermarking,” in Proceedings of the 2001 workshop on Multimedia and security: new challenges Ottawa, Ontario, Canada: ACM, 2001, pp. 3–6.
- G. Boato, F. G. B. De Natale, and C. Fontanari, “Digital Image Tracing by Sequential Multiple Watermarking,” IEEE Transactions on Multimedia, vol. 9, pp. 677–686, 2007.
- F. Xiaoyu, Z. Hongting, W. Hsiao-Chun, and W. Yiyan, “A New Approach for Optimal Multiple Watermarks Injection,” IEEE Signal Processing Letters, vol. 18, pp. 575–578, 2011.
- X. Q. Zhou, H. K. Huang, and S. L. Lou, “Authenticity and integrity of digital mammography images,” IEEE Transactions on Medical Imaging, vol. 20, pp. 784–791, 2001.
- S. Samuel and W. T. Penzhorn, “Digital watermarking for copyright protection,” in 7th AFRICON Conference 2004, pp. 953–957.
- W. Xiaoyun and Y. Hongbo, “How to break MD5 and other hash functions,” in Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques Aarhus, Denmark: Springer-Verlag, 2005, pp. 19–35.
- W. Xiaoyun, Y. Yiqun Lisa, and Y. Hongbo, “Finding collisions in the full SHA-1,” in Proceedings of the 25th annual international conference on Advances in Cryptology Santa Barbara, California: Springer-Verlag, 2005, pp. 17–36.
- National Institute of Standards and Technology, “Secure Hash Standard (SHA),” in FIPS PUB 180-4, 2012.
- S. Gueron, S. Johnson, and J. Walker, “SHA-512/256,” in Eighth International Conference on Information Technology: New Generations (ITNG), 2011, pp. 354–358.
- H. Khali, R. Mehdi, and A. Araar, “A system-level architecture for hash message authentication code,” in IEEE International Conference on Electronics, Circuits and Systems, 2005, pp. 1–4.
- A. Satoh and T. Inoue, “ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS,” in International Conference on Information Technology: Coding and Computing, 2005, pp. 532–537.
- H.-Q. Li and C.-y. Miao, “Hardware Implementation of Hash Function SHA-512,” in International Conference on Innovative Computing, Information and Control 2006, pp. 38–42.
- National Institute of Standards and Technology, “DIGITAL SIGNATURE STANDARD (DSS),” in FIPS PUB 186-2, 2000.
- Z. Hong-Bin, Y. Cheng, and Q. Xiao-Mei, “Image authentication based on digital signature and semi-fragile watermarking,” Journal of Computer Science & Technology, vol. 19, pp. 752–759, 2004.
- J.-z. Deng, X.-h. Cheng, and Q. Gui, “Design of Hyper Elliptic Curve Digital Signature,” in International Conference on Information Technology and Computer Science, 2009, pp. 45–47.
- G. Nabil, K. Naziha, F. Lamia, and K. Lotfi, “Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves,” in International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012, pp. 1–6.
- Q. Ying, L. Chengxia, and X. ShouZhi, “A fast ECC digital signature based on DSP,” in International Conference on Computer Application and System Modeling (ICCASM), 2010, pp. V783–V786.
- Z. Yong-Dong, T. Sheng, and L. Jin-Tao, “Secure and incidental distortion tolerant digital signature for image authentication,” Journal of Computer Science & Technology, vol. 22, pp. 618–625, 2007.
- A. Nenadic, Z. Ning, S. Qi, and C. Goble, “Certified e-mail delivery with DSA receipts,” in IEEE International Parallel and Distributed Processing Symposium, 2005, pp. 1–8.
- S. M. Saad, “Design of a robust and secure digital signature scheme for image authentication over wireless channels,” IET Information Security, vol. 3, pp. 1–8, 2009.
- Y. Zhang and W. Zhou, “An ECDSA signature scheme designs for PBOC 2.0 specifications,” in 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) 2012, pp. 2106–2110.
- S. Xue and X. Mingping, “An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography,” in International Conference on Computer and Communications Security, 2009, pp. 88–91.
- J. Schmidt and M. Medwed, “A Fault Attack on ECDSA,” in Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2009, pp. 93–99.
- S. S. Manvi, M. S. Kakkasageri, and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach,” in International Conference on Future Computer and Communication, 2009, pp. 16–20.
- K. Komathy and P. Narayanasamy, “Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks,” in International Multi-Conference on Computing in the Global Information Technology, 2006, pp. 61–64.
- X. Hongqi, Z. Qiuxia, and K. Guoli, “Broadcasting multi-digital signature algorithm based on the Elliptic Curve cryptosystem,” in IEEE Symposium on Electrical & Electronics Engineering (EEESYM) 2012, pp. 567–569.
- C. Yun, C. Xin, and M. Yi, “A Parallel Key Generation Algorithm for Efficient Diffie-Hellman Key Agreement,” in International Conference on Computational Intelligence and Security, 2006, pp. 1393–1395.
- M. A. Strangio, “Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves,” in Proceedings of 20th ACM Symposium on Applied Computing (SAC), 2005, pp. 324–331.
- A. Singh and R. Rishi, “A Novel Approach towards Mutual Authentication and Key Exchange Protocol Based on Elliptic Curve,” in Second International Conference on Advanced Computing & Communication Technologies (ACCT), 2012 pp. 404–408.
- W. Chia-Hui and L. Yu-Shun, “A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes,” Journal of Network and Computer Application, vol. 34, pp. 1545–1556, 2011.
- Y. Eun-Jun and Y. Kee-Young, “A new elliptic curve diffie-hellman two-party key agreement protocol,” in 7th International Conference on Service Systems and Service Management (ICSSSM), 2010, pp. 1–4.
- L. Harn, W. J. Hsin, and M. Mehta, “Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption,” IEE Proceedings- Communications, vol. 152, pp. 404–410, 2005.
- W. Shengbao, C. Zhenfu, M. A. Strangio, and W. Lihua, “Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol,” IEEE Communications Letters, vol. 12, pp. 149–151, 2008.
- H. Tang, L. Zhu, and Z. Zhang, “A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman,” in 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp. 1–4.
- National Institute of Standards and Technology, “ADVANCED ENCRYPTION STANDARD,” in F. I. P. S. Publication 197, 2001.
- J. A. Brown, S. Houghten, and B. Ombuki-Berman, “Genetic algorithm cryptanalysis of a substitution permutation network,” in IEEE Symposium on Computational Intelligence in Cyber Security, 2009, pp. 115–121.
- M. Rhee, “Advanced Encryption Standard and Elliptic Curve Cryptosystems,” in Mobile Communication Systems and Security Wiley-IEEE Press, 2009, pp. 341–386.
- S. Heron, “Advanced Encryption Standard (AES),” in Network Security. vol. 12, 2009, pp. 8–12.
- W. E. Burr, “Selecting the Advanced Encryption Standard,” IEEE Security & Privacy, vol. 1, pp. 43–52, 2003.
- M. Seshadrinathan and K. L. Dempski, “Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,” in IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2008, pp. 1–6.
- S. H. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified version of Advanced Encryption Standard based algorithm for image encryption,” in International Conference on Electronics and Information Engineering (ICEIE), 2010 pp. V1141–V1145.
- S. Kilts, “Example Design: The Advanced Encryption Standard,” in Advanced FPGA Design: Architecture, Implementation, and Optimization: Wiley-IEEE Press, 2007, pp. 47–68.
- A. A. Shtewi, B. E. M. Hasan, A. E. Fatah, and A. Hegazy., “An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems,” International Journal of Computer Science and Network Security, vol. 10, pp. 226–232, 2010.
- R. C. W. Phan, “Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES),” Information Processing Letters, vol. 91, pp. 33–38, 2004.
- E. S. A. M. ElBadawy, A. Mokhtar, W. A. El-Masry, and A. E. S. Hafez, “A new chaos Advanced Encryption Standard (AES) algorithm for data security,” in International Conference on Signals and Electronic Systems (ICSES), 2010 pp. 405–408.
- C. Ko-Ming and C. Long-Wen, “A novel public watermarking system based on advanced encryption system,” in 18th International Conference on Advanced Information Networking and Applications, 2004, pp. 48–52.
- Z. Lin, Q. Fengyong, G. Yi, and Z. Yuesheng, “A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking,” in International Colloquium on Computing, Communication, Control, and Management, 2008, pp. 312–316.
- L. Xiang, C. Junli, Q. Dinghu, and W. Wanggen, “Research and realization based on hybrid encryption algorithm of improved AES and ECC,” in International Conference on Audio Language and Image Processing (ICALIP), 2010 pp. 396–400.