Abstract
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by humans and are instead done on computers. Trusting a digital signature implies trusting the computer which produced/checked it. Often, this trust cannot be taken for granted. This paper presents a method for visual authentication of large messages which relies on embedding a human-recognizable watermark and needs practically no computational power on the receiver side. Also, using a simple challenge-response mechanism is proposed to prevent attackers from obtaining signatures without author’s knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1996)
Trusted Computing Group: Home page (2005)
Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2003)
Fried, I.: Microsoft: ‘Trusted Windows’ still coming, trust us (2005)
Slater, D.: Microsoft trusted computing updates (2005)
Chiachiarella, F., Fasting, U., Fey, T., Leppler, S., Lux, G., Lubb, P., Moser, A., Otten, G., Schlattmann, J., Schumann, S., Schweizer, L., Souren, F.J.: Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft. Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV 13 (2004)
Trusted Computing Group: Trusted Computing Group Clarifications for the German Insurance Industry Association paper The Threat, Trusted Computing, to the German Insurance Industry (2005)
TCG Best Practices Committee: Design, implementation, and usage principles for TPM-based platforms (2005)
Russinovich, M.: Sony, rootkits and digital rights management gone too far (2005)
Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Aucsmith, D.: Tamper resistant software: An implementation. In: Proceedings of the First International Workshop on Information Hiding, pp. 317–333. Springer, London (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fischer, I., Herfet, T. (2006). Visual Document Authentication Using Human-Recognizable Watermarks. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_36
Download citation
DOI: https://doi.org/10.1007/11766155_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34640-1
Online ISBN: 978-3-540-34642-5
eBook Packages: Computer ScienceComputer Science (R0)