IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

A Data Hiding Method Based on Ramp Secret Sharing for the Authentication and Self Repairing of Document Images Mary Linda P A1, Larry Liston2, Livingston Antony P A3, Lisha P P4 1

M.Tech, Department of Computer Engineering, Model Engineering College Ernakulam, Kerala, India [email protected] 2

3

4

Assistant Professor, Department of Mechanical Engineering, Jyothi Engineering College, Thrissur, Kerala, India [email protected]

Assistant Professor, Department of Electronic & Communication Engineering, Thejus Engineering College, Thrissur, Kerala, India [email protected]

Assistant Professor, Department of Computer Engineering, Model Engineering College Ernakulam, Kerala, India [email protected]

Abstract A new efficient authentication method is proposed for document images with verification and data self-repair capability using the Portable Network Graphics (PNG) image. Here, an authentication signal is generated for each block of a document image which, combine with the binarized block data, is transformed into several shares using the Ramp secret sharing scheme. These several binarized block data shares are then embedded into an alpha channel plane Some security measures are also proposed for protecting the security of the shares hidden in the alpha channel. Here KBRP method is used to embed the shares randomly into alpha channel plane. During the embedding process, the generated share values are mapped into a range of 238-255 to yield a transparent stego-image with a disguise effect. Alpha channel is combining with the original image and converted into PNG image format. While the process of image authentication, the image block is marked as tampered, if the authentication signal generated from the current block content does not match with share that extracted from the alpha channel plane. Then using reverse Ramp scheme, two shares from unmarked blocks are collected and then data repairing is applied.

Keywords: Image authentication, KBRP, Portable Network Graphics, Ramp secret sharing.

1. Introduction Digital images are widely used to protect important and confidential information. The authentication and integrity to these digital images is a very challenging task. Due to the open availability of digital image processing tools, open access of the digital data is easily possible. So changes to original data and reuse of

Mary Linda P A, IJRIT

92

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

visual material are also becoming easy. And so nowadays is very easy to create illegal copies and to change the images in such a way that the identification of big economic or human lives losses is very difficult. It is very necessary to ensure the integrity and authenticity of a digital data of images. It is very important to propose effective methods to solve this type of image authentication problem. To solve this problem secret image sharing scheme has been used. Secret image sharing method generates several shares which are then shared in the protected document image, and the protected image at receiver side is reconstructed by enough different shared shares. If part of an image is verified to be modified illegally, the changed content can be repaired. The main advantage of this method is here we don’t require original image to check the integrity of received data. The integrity is checked with received image only. In this paper, a system for authentication of document images with extra self-repair capability for fixing tampered image data is explained. Using this extra authentication signal the tampering of the data is detected. This authentication signal is calculated form binary image with 2 main values. Then the original image is transformed into a stego-image by combining it with alpha channel. While the process of image authentication the stego image is verified for its authenticity and integrity. Data modifications of the stegoimage can be detected and repaired at the pixel level. If the alpha channel is not present in the stego-image, the resulting image is considered as unauthenticated. Secret message is converted into n shares i.e authentication signals for embedding it in the original image; and when k of the n shares, are gathered the secret message can be recovered completely. This type of secret sharing scheme is helpful for reducing the risk of significant partial data loss. In the proposed method the binary image authentication with repair capability is designed for grayscale images. Using secret sharing scheme the shares are generated which are distributed randomly in the image block. Authentication signal is generated and used to calculate the shares. Alpha channel is used for transparency and for mapping this extra authentication signal. The remainder of this paper is organized as follows: In Section II, the proposed method is discussed. In Section III, the Ramp secret sharing method on which the proposed method is based is reviewed. In Section IV, V, VI, the details of the proposed method, including generation of stego-image, authentication of image, and tampered data repairing, are described respectively. In Section VII, comparison between Shamir and ramp secret sharing is shown. In Section VIII, some discussions about the merits of the proposed method are given. In Section IX Experimental results and a comparison of performances of the proposed method with others are shown. In Section X, conclusion is discussed, followed by future scope in Section XI.

2. Proposed Method The proposed method deals with image content authentication with a data repair capability for document image via the use of the Portable Network Graphics (PNG) image. An authentication signal is generated for each block of a document image and combined with the binarized block data, which is transformed into several shares using the Ramp method. The generated shares are embedded into an alpha channel. Alpha channel plane is combining with the original image and converted into PNG image format.

Mary Linda P A, IJRIT

93

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Figure 1: Flow Chart of the Proposed Method During the embedding process, the computed share values are mapped into the small range of 23-255 and these values is embedding into alpha channel. In image authentication process, an image block is marked as altered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each altered block by a reverse Ramp secret scheme. Protecting the security of the data hidden in the alpha channel is also measured. This project proposes an authentication method that deals with the binary-like document images instead of pure binary ones and simultaneously solves the problem of image tampering.

3. Ramp Secret Sharing Method The proposed approach to secret image sharing is based on the (k, n)-threshold secret sharing method. In this section we describe how to use the Ramp method for conventional secret sharing. 3.1. Algorithm for secret share generation Preliminaries:

: A bitwise XOR operation || : Concatenation of bit sequences np : A prime number that is np ≥ n. wi : A share given to i-th participant Pi. (i = 0, . . . , n − 1) S : The secret ( S € {0,1}d(np-1) , d>0) Input: Secret S and n. Output: Shares w.

Mary Linda P A, IJRIT

94

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

1: Let np : prime number >=n 2: Divide the S into (np - 1) pieces of d-bit

segment equally

S->S1 || S2 || S3 || S4 || S5 || S6 3: Prepare S0 as a d-bit zero sequence 4: Generate (k-1) np - 1 of d-bit random numbers rji 5: Execute XOR operation by the following equation

6: Concatenate np - 1 pieces and generate a share w(i)

3.2. Algorithm for secret share recovery Input: Shares w. Output: Secret S and n. 1: Obtain the binary matrices Gt0 , Gt1, Gt2 such that wi = Gi · r.

Gi = (I4, Ei, L-i) Iα : α x α identity matrix

2: Execute the Gaussian Elimination and obtain the matrix M

Mary Linda P A, IJRIT

95

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Solving the system of equation for S1, S2 , S3, S4 3: Execute the following operation and obtain the secret ( S1, S2 S3, S4) = M. Wi

4. KBRP Method Key Based Random Permutation (KBRP) is a method that can generate one permutation of size n out of n! permutations. This permutation is generated from key (alphanumeric string) by considering all the elements of this key in the generation process. The permutation is stored in one-dimensional array of size equal to the permutation size (N). In this paper KBRP is used to find the random positions to embedded the shares into the alpha channel. The process involves three consecutive steps: init(), eliminate(), and fill(). 4.1. Algorithm for stage 1: Initialization First step, init(), is to initialize array of size n with elements from the given key, by taking the ASCII code of each element in the key and storing them in the array consecutively. To complete all elements of the array, And fill the array by adding two consecutive values of the array. Finally, all values are set to the range 1 to N by applying the mode operation. Input: No: of block and secret key. Output: Position array to embed the shares. let K: key of size S P: array holds permutation with values 1 to N N: array size for i=1 to S do A[i]=K[i] end for for i=1 to S-1 do P[i]=P[i]+P[i+1] end for P[S]=A[1] while S < N do j=S+1 for i= 1 to S-1 do for k=i to S-1 && j<=N do P[i]=P[i]+P[k+1] j++ end for end for end while for i=1 to N do P[i] = P[i] mod N end for 4.2. Algorithm for stage 2: Elimination The second step, eliminate(), is to get rid of repeated values by replacing them with value of zero and keep only one value out of these repeated values.

Mary Linda P A, IJRIT

96

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

L: left of array P R: right of array P for All values where L 0 do decrement j end while if j>0 then P[j]=A[i] increment i end if k=1 while (P[k]j=0 && k<=N) do increment k end while if k<=N then P[k]=A[i] increment i end if end while

5. Generation of a Stego-Image A comprehensive algorithm for describing the generation of a stego-image in the PNG format of the anticipated method is presented as follows:

Mary Linda P A, IJRIT

97

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Figure 2. Generation of a stego-image 5.1. Algorithm for generation of stego-image. Input: Input image I with two gray value and a secret key k. Output: Stego-image I0 in PNG format with relevant data embedded, including the authentication signal and the data used for repairing. 1: Resize the image with width and height as multiple of 6 so as make sure all pixels come within a block completely. Part 1: Authentication signal generation. 2: Input image Binarization. Apply the moment-preserving technique to obtain two major values of the image Z1 and Z2 where Z1 represents binary value of 1 ad Z2 represents 0. Calculate the threshold used to binarized the image using the formula T= (Z1+Z2)/2 3: Save the binarized image as Ib. 4: Transform the input image into PNG format along with alpha channel. Let all the pixels have the values of alpha channel as 255. Let the image be IALPHA. 5: Take the raster scan of unprocessed blocks of size 2x6 with values P1,P2....P6 from the image Ib. 6: Creation of authentication signal. Generate a 2-bit authentication signal s=a1a2 where a1 = P1 xor P2 xor P3 and a2 = P4 xor P5 xor P6 Part 2: Design and embedding of shares. 7: Concatenate the values a1, a2, P1 to P6 to form a 8-digit string containing only 0s and 1s and convert into decimal equivalent of these numbers. 9. Let S be the decimal equivalent of these number. 10: Add 238 to the values of Q1 through Q6, resulting in a new value Q11 through Q61 so as to get their values in the near transparency zone. 11: Obtain the corresponding block at the alpha channel of the image IALPHA. Embed the first two values Q11 and Q21 in the same block at the first column of the block of alpha channel.

Mary Linda P A, IJRIT

98

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Figure 3. Embedding 6 shares generated for a block, 2 Shares embedded in current block and the other 4 in 4 randomly selected pixels outside the block, with each selected pixel not being the first 2 one in any block 12: Using the key , spread the remaining 4 values Q31 , Q41, Q51 and Q61 in the different pixels alpha channel of the image. Make sure while embedding randomly, none of the values are overwritten and the first column of other blocks are never used for this spreading. 13: if there exist any unprocessed block in Ib then go to step 5 14: Take final I in the PNG format as the desired stego-image I0.

6. Authentication of a Stego-Image A complete algorithm describing the proposed stego-image authentication process including verification of the original image content is described below

Figure 4. Flow Chart for Authentication of Image 6.1. Algorithm for verification of stego-image.

Mary Linda P A, IJRIT

99

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Input: Stego-image I0 with gray values Z1 and Z2 and secret key K. Output: Image with tampered blocks marked. 1: Verify whether the image has alpha channel. If not, discard the whole image as unauthentic and request for retransmission of original image. 2: Input image Binarization. Apply the moment-preserving technique to obtain two major values of the image Z1 and Z2 where Z1 represents binary value of 1 ad Z2 represents 0. Calculate the threshold used to binarized the image using the formula T= (Z1+Z2)/2 3: Save the binarized image as Ib. 4: Take the raster scan of unprocessed blocks Bb from Ib with pixel values P1,P2....P6 and find the six pixel Q11 through Q61 of the corresponding block BALPHA in the alpha channel IALPHA of Ib. 5: Subtract 238 from each of Q11 and Q21to obtain two partial shares Q1 and Q2 and of Bb respectively. 6: Extraction of authentication from the BALPHA . s=a1a2 7: Computation of the authentication signal from the current block Bb. s1 =a11 . a21 where a11 = P1 xor P2 xor P3 and a21 = P4 xor P5 xor P6 8: Compare the authentication signal s and s1 9: if s and s1 matches then mark the block as authenticated and move to the next block else mark the block as tampered and proceed to the next block. 10: After all blocks are processed we obtain the image with all the tampered blocks IMARK.

7. Repairing of a Stego-Image A complete algorithm for repairing the tampered block verification of the original image content is described below

Figure 5. Flow Chart for Repairing of Image

Mary Linda P A, IJRIT

100

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

7.1. Algorithm for repairing of tampered blocks. Input: Image with tampered blocks marked. Output: Image Ir which has the pixels repaired. 1: Subtract 238 from these alpha channel values to obtain the shares. 2: Obtain raster scan of block B of size 2x6 from I and check whether block is marked. 3: If not, proceed to the next block by marking this block as repaired. 4: If yes, choose 2 shares out of 6 shares which are preferably from a block that are marked untampered. 5: Using reverse ramp secret sharing, obtain the secret values S. 6: Convert the decimal equivalent to binary. Concatenate the binary values to form the 8-digit string. 7: Take each digit from the 8-bit string and convert to gray value as follows: 8: If the value is 0 then replace the corresponding pixel in the block of the image by Z2 else by Z1 9: Proceed to the next block till the complete image is processed.

8. Comparison Here the proposed method use ramp secret sharing method for share generation and secret recovery, which is computationally fast and cost effective when compared with the conventional secret sharing method. Comparison of the ramp secret sharing and Shamir secret sharing scheme is shown below:

9. Advantages of Proposed System • • • •

Providing pixel-level repairs of tampered image parts. Having higher possibility to survive image content attacks. Making use of a new type of image channel for data hiding. No distortion to the input image

10. Experimental Result For editing the image three common operations are used. They are superimposing, noise and painting. Experimental result using a document images are shown below:

Mary Linda P A, IJRIT

101

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

(a)

(b)

(c) Figure 6. Experimental result of a document image of a sign.(a) Original Image (b) Alpha channel plane after embedding the share between the range of 238-255 (c) Stego-image with alpha channel in PNG format

(a)

Mary Linda P A, IJRIT

102

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

(b)

(c) Figure 7. Authentication result of a document image of a check in the form of PNG attacked by added noises.(a) Tampered image with added noises. (b) Data repair result (Grayscale image). (c) Data repair result (Binary image). Table 1: Statistics of Experimental result of tampered image by noise shown in figure 7 Ratio :

Value

No. of Blocks

36580

No. of Tampered Blocks (Tampering Ratio)

6.8343

No. of Detected Blocks (Detection Ratio)

86

No. of Repaired Blocks (Repair Ratio)

100

False Acceptance Ratio

14.00

False Rejection Ratio

0

Mary Linda P A, IJRIT

103

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

(a)

(b)

(c) Figure 8. Authentication result of a document image of a check in the form of PNG attacked by painting. (a) Tampered image with painting. (b) Data repair result (Grayscale image). (c) Data repair result (Binary image). Table 2: Statistics of Experimental result of tampered image by painting shown in figure 8 Ratio :

Value

No. of Blocks

36580

No. of Tampered Blocks (Tampering Ratio)

2.2909

Mary Linda P A, IJRIT

104

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

Ratio :

Value

No. of Detected Blocks (Detection Ratio)

87.709

No. of Repaired Blocks (Repair Ratio)

100

False Acceptance Ratio

12.291

False Rejection Ratio

0

(a)

(b)

Mary Linda P A, IJRIT

105

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

(c) Figure 9. Authentication result of a document image of a check in the form of PNG attacked by superimposing. (a) Tampered image with superimposing. (b) Data repair result (Grayscale image). (c) Data repair result (Binary image). Table 3: Statistics of Experimental result of tampered image by superimposition shown figure 9 Ratio :

Value

No. of Blocks

36580

No. of Tampered Blocks (Tampering Ratio)

2.7747

No. of Detected Blocks (Detection Ratio)

85.911

No. of Repaired Blocks (Repair Ratio)

100

False Acceptance Ratio

14.089

False Rejection Ratio

0

11. Conclusion & Future Scope This paper proposed an image document authentication method along with self-repair capability, error localization and owner verification for gray scale document images based on ramp secret sharing and permutation. Both the generated authentication signal and the content of a block are transformed into partial shares by ramp secret sharing method, which are then embedded into an alpha channel plane to create a stego-image in the PNG format, after applying a permutation using secret key generated by KBRP algorithm. For self- repairing, the content of the block from any 2 un-tampered shares is used. Experimental results have shown to prove the effectiveness of the proposed method. Future studies may be aimed at choices of alternative block sizes and connected parameters (prime value range, value for secret sharing, range of authentication signal bits, etc.) to enhance data repair effects. Some security measures for enhancing the protection of the data embedded in the alpha channel plane is also specified. Applications of the proposed method for authentication and repairing of attacked color images, and block based owner validation may also be applied.

References [1] W.H. Tsai, “Moment-Preserving thresholding: a new approach.” Computer Vision, Graphics, and Image Processing, vol. 29, no.3, pp.377-393, 1985. [2] Wen-Ai Jackson and Keith M.Martin, “A Combinatorial Interpretation of Ramp Schemes.’’, Australasian Journal of Combinatorics, vol. 14, pp. 51-60,1996

Mary Linda P A, IJRIT

106

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 92- 107

[3] Chang-Chou Lin, Wen- Hsiang Tsai, “Secret Image Sharing With Steganography And Authentication” Department Of Computer And Information Science, National Chiao Tung University, Hsinchu 300,Taiwan,;Accepted 20 July 2003. [4] M. Wu and B. Liu, “Data hiding in binary images for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004. [5] H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741–744, Dec.2006. [6] H. Yang and A. C. Kot, “Pattern-based data hiding for binary images authentication by connectivitypreserving,” IEEE Trans. Multimedia, vol. 9, no. 3, pp. 475–486, Apr. 2007. [7] Che-Wei Lee and Wen-Hsiang Tsai “A secret-sharing based method for authentication of grayscale document images via the use of the png image with data repair capability” IEEE Trans. Image Processing., vol.21, no.1, January 2012. [8] C. H. Tzeng and W. H. Tsai, “A new approach to authentication of binary images for multimedia communication with distortion reducduction and security enhancement,” IEEE Commun. Lett., vol. 7, no. 9, pp. 443–445, Sep. 2003.

Mary Linda P A, IJRIT

107

A Data Hiding Method Based on Ramp Secret ...

into an alpha channel plane Some security measures are also proposed for protecting the security of the shares hidden in the ... tampered, if the authentication signal generated from the current block content does not match with share that extracted ..... range, value for secret sharing, range of authentication signal bits, etc.

548KB Sizes 0 Downloads 222 Views

Recommend Documents

A Data Hiding Method Based on Ramp Secret Sharing for the ...
Keywords: Image authentication, KBRP, Portable Network Graphics, Ramp secret sharing. 1. Introduction. Digital images are widely used to protect important and confidential information. .... Part 2: Design and embedding of shares.

Protecting sensitive knowledge based on clustering method in data ...
Protecting sensitive knowledge based on clustering method in data mining.pdf. Protecting sensitive knowledge based on clustering method in data mining.pdf.

A collocated isogeometric finite element method based on Gauss ...
Sep 22, 2016 - ... USA; Phone: +1 612 624-0063; Fax: +1 612 626-7750; E-mail: do- [email protected]. Preprint submitted to Computer Methods in Applied Mechanics and ... locking-free analysis of beams [9, 10] and plates [11, 12], ...

A Domain Decomposition Method based on the ...
Nov 1, 2007 - In this article a new approach is proposed for constructing a domain decomposition method based on the iterative operator splitting method.

A Progressive Image Transmission Method based on Discrete ...
A Progressive Image Transmission Method based on Discrete Wavelet Transform (DWT).pdf. A Progressive Image Transmission Method based on Discrete ...

A New Data Representation Based on Training Data Characteristics to ...
Sep 18, 2016 - sentence is processed as one sequence. The first and the second techniques are evaluated with MLP, .... rent words with the previous one to represent the influence. Thus, each current input is represented by ...... (better disting

Reversible Data Hiding
technique, which enables the exact recovery of the original host signal upon extraction of the ... ues in the digital representation of the host signal, e.g. overflows.

Applying the Apriori-based Graph Mining Method to Mutagenesis Data ...
The method was used to analyze mutagenicity data for 230 aromatic nitro compounds. ... occurring subgraph patterns from graph-structured data. Our recent study introduced algebraic graph theory to the framework of Basket Analysis. The method is calle

A Multiple Layered Spatial Data Integration Framework Based on ...
JAVA. RMI. Access. Local. Remote. NetBIOS. TCP/IP. Figure 5 shows another portion of ontology of the Persistence category. Its related concepts are Format, Access, .... Middleware. Figure 6 shows the process for data search/query/integration from the

A Multiple Layered Spatial Data Integration Framework Based on ...
modeling, data mining, textual analysis, and statistical techniques. ... model which can be converted to database schema, or a result of a data mining .... Excel. Interface. POP3. Distributed. API. WebService. ODBC. DCOM. CORBA. JAVA. RMI. Access. Lo

CORE - A Contextual Reader based on Linked Data
Department of. Computer Science. A Contextual Reader for First World. War Primary Sources. Demonstrative documents: ○ a primary source PDF from the CU-Boulder WWI Collection. Online. ○ a postcard with metadata from the Great War Archive. ○ an e

SeDas A Self-Destructing Data System Based on Active Storage ...
SeDas A Self-Destructing Data System Based on Active Storage Framework..pdf. SeDas A Self-Destructing Data System Based on Active Storage Framework..

Novel method based on video tracking system for ...
A novel method based on video tracking system for simultaneous measurement of kinematics and flow in the wake of a freely swimming fish is described.

Novel Target Decomposition Method based on ...
(a) The span image (b)r1 (c) r2 (d) r3. 4. Experimental results. A NASA/JPL AIRSAR L-band image of the NASA ARC is used to test the proposed target decomposition method. The span image is shown in Fig.(a). In this experiment, we use a plate, a diplan

An Energy Expenditure Estimation Method Based on ...
Summary of the validation studies. ... needed and only heart beat data and personal background parameters (e.g. ... EE is easily accessible from HR data.

Object Tracking Based On Illumination Invariant Method and ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 8, August 2014, Pg. 57-66 ... False background detection can be due to illumination variation. Intensity of ... This means that only the estimated state from the.

Novel Target Decomposition Method based on ...
California Institute of Technology, Pasadena, 1985. 2. Evans D. L., Farr T. G., Van Zyl J. J. and Zebker H. A., “Radar polarimetry: Analysis tools and applica-.

Object Tracking Based On Illumination Invariant Method and ... - IJRIT
ABSTRACT: In computer vision application, object detection is fundamental and .... been set and 10 RGB frames are at the output captured by laptop's webcam.

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

data hiding using watermarking
Digital watermarking is not a new name in the tech- nology world but there are different techniques in data hiding which are similar ... It may also be a form or type of steganography and is used for widespread use. ... does is take the content, use

Secret-Sharing Schemes Based on Self-dual Codes
to other classes of codes [6], [7], [10], [11]. In the present ... are best computed using a powerful computer algebra language ... from coding theory see [8] or [9].

Method and apparatus for computing a shared secret key
Mar 30, 2011 - Digital signatures are a class of cryptographic protocols used to provide authentication. As in all public key systems, a sender has a private key ...

Optimized Method for Bulk Data Transfer on Internet ...
using minimum cost flow algorithms on a time-expanded version of the .... [3] The Delay-Friendliness of TCP for Real-Time Traffic Eli Brosh, Salman Abdul Baset, ...

A Method for Integration of Web Applications Based on ...
of data in an integrated manner, called mashup or mixup. These integration ... and extraction, and the users can integrate Web applications with our class package ..... posium on User Interface Software and Technology, pages. 9–18, 1998.