Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by humans and are instead done on computers. Trusting a digital signature implies trusting the computer which produced/checked it. Often, this trust cannot be taken for granted. This paper presents a method for visual authentication of large messages which relies on embedding a human-recognizable watermark and needs practically no computational power on the receiver side. Also, using a simple challenge-response mechanism is proposed to prevent attackers from obtaining signatures without author’s knowledge.
KeywordsSmart Card Message Authentication Code Trusted Platform Module Trust Computing Visual Cryptography
Unable to display preview. Download preview PDF.
- 3.Trusted Computing Group: Home page (2005)Google Scholar
- 4.Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2003)Google Scholar
- 5.Fried, I.: Microsoft: ‘Trusted Windows’ still coming, trust us (2005)Google Scholar
- 6.Slater, D.: Microsoft trusted computing updates (2005)Google Scholar
- 7.Chiachiarella, F., Fasting, U., Fey, T., Leppler, S., Lux, G., Lubb, P., Moser, A., Otten, G., Schlattmann, J., Schumann, S., Schweizer, L., Souren, F.J.: Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft. Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV 13 (2004)Google Scholar
- 8.Trusted Computing Group: Trusted Computing Group Clarifications for the German Insurance Industry Association paper The Threat, Trusted Computing, to the German Insurance Industry (2005)Google Scholar
- 9.TCG Best Practices Committee: Design, implementation, and usage principles for TPM-based platforms (2005)Google Scholar
- 10.Russinovich, M.: Sony, rootkits and digital rights management gone too far (2005)Google Scholar