Noise Tolerant Data Authentication for Wireless Communication by Obaid Ur-Rehman & Natasa Zivic

Noise Tolerant Data Authentication for Wireless Communication by Obaid Ur-Rehman & Natasa Zivic

Author:Obaid Ur-Rehman & Natasa Zivic
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


3.8 Conclusion

Noise tolerant data authentication mechanisms are discussed in this chapter. These methods are tolerant to minor modifications in the data and/or its authentication tag. Such methods include generic noise tolerant data authentication algorithms, content-based noise tolerant algorithms using feature extraction, noise tolerant authentication algorithms using FEC codes, and digital watermarking techniques.

References

1.

R.F. Graveman, K.E. Fu, Approximate message authentication codes, in Proceedings of the 3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution, vol. 1, College Park, Feb 1999 (Cambridge University Press, 2005)



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.