On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
Charles BouillaguetOrr DunkelmanPierre-Alain FouqueAntoine JouxPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- digital images
- jpeg images
- access control
- security requirements
- information security
- compression scheme
- statistical databases
- data structure
- intrusion detection
- image compression
- compression ratio
- security policies
- security issues
- network security
- compression algorithm
- hash functions
- similarity search
- encryption scheme
- lossy compression
- security model
- file organization