It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Watermarks and Text Transformations in Visual Document Authentication | Fischer | Journal of Computers
Journal of Computers, Vol 2, No 5 (2007), 44-53, Jul 2007
doi:10.4304/jcp.2.5.44-53

Watermarks and Text Transformations in Visual Document Authentication

Igor Fischer, Thorsten Herfet

Abstract


Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based on cryptography and require computers or similar hardware to be produced. They can be trusted only as long as the employed hardware can be trusted. We present a complementary scheme for document authentication in untrusted environment. The scheme combines visual authentication, human- recognizable watermarks, and image transformations, and is suitable also for larger text document. Because it relies on visual cryptography, it requires practically no computational power on the receiver side. To prevent potential attackers from obtaining signatures without author’s knowledge, we propose using a simple challenge-response protocol.



Keywords


visual authentication; digital documents; watermarks; text deformations; CAPTCHA

References



Full Text: PDF


Journal of Computers (JCP, ISSN 1796-203X)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.