Noise Tolerant Data Authentication Mechanisms

  • Obaid Ur-Rehman
  • Natasa Zivic
Part of the Signals and Communication Technology book series (SCT)


In this chapter, some important noise tolerant data authentication mechanisms are discussed. These include the generic noise tolerant data authentication constructs as well as the one built specifically for content-based authentication. Some of the noise tolerant data authentication algorithms internally use forward error correcting codes to provide the additional ability of error location and correction in addition to noise tolerant authentication. These techniques are also briefly discussed in this chapter. Noise tolerant data authentication using digital watermarking is also quite common, and a brief introduction to such watermarking techniques is given in this chapter as well.


Approximate MAC Soft input decryption Noise tolerant MAC Weighted authentication Feature extraction Watermarking 


  1. 1.
    R.F. Graveman, K.E. Fu, Approximate message authentication codes, in Proceedings of the 3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution, vol. 1, College Park, Feb 1999 (Cambridge University Press, 2005)Google Scholar
  2. 2.
    D. Tonien, R. Safavi-Naini, P. Nickolas, Breaking and repairing an approximate message authentication scheme. Discret. Math. Algorithms Appl. 3(3), 393–412 (2011)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    L. Xie, G.R. Arce, R.F. Graveman, Approximate image message authentication codes. IEEE Trans. Inf. Theory 56, 4922–4940 (2010)CrossRefGoogle Scholar
  4. 4.
    C. Ruland, N. Zivic, Soft input decryption, 4th Turbo-code Conference, 6th Source and Channel Code Conference, VDE/IEEE, Munchen, 3–7 April 2006Google Scholar
  5. 5.
    C. Berrou, A. Glavieux, P. Thitimajshima, Near Shannon limit error correcting coding and decoding: Turbo codes, Proceeding of IEEE International Conference on Communication, vol. 2/3, pp. 1064–1070, Geneva, 1993Google Scholar
  6. 6.
    J. Hagenauer, Soft Is Better than Hard, Communications, Coding and Cryptology (Kluwer Verlag, Leiden, 1994)zbMATHGoogle Scholar
  7. 7.
    D. Chase, A class of algorithms for decoding block codes with channel measurement information. IEEE Trans. Inf. Theory 18, 170–182 (1972)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    C.G. Boncelet Jr., The NTMAC for authentication of noisy messages. IEEE Trans. Inf. Forensics Secur. 1, 1 (2006)CrossRefGoogle Scholar
  9. 9.
    O. Ur-Rehman, N. Zivic, S. Amir Tabatabaei, C. Ruland, Error correcting and weighted noise tolerant message authentication codes, 5th International Conference on Signal Processing and Communication Systems, Hawaii, Dec 2011Google Scholar
  10. 10.
    O. Ur Rehman, N. Zivic, Noise tolerant image authentication with error localization and correction, 50th Annual Allerton Conference on Communication, Control, and Computing, pp. 2081–2087, Allerton, 1–5 Oct 2012Google Scholar
  11. 11.
    D.G. Lowe, Distinctive image features from scale invariant keypoints. Int. J. Comput. Vis. 50(2), 91–110 (2004)CrossRefGoogle Scholar
  12. 12.
    C. Ling, O. Ur-Rehman, W. Zhang, Semi-fragile watermarking scheme for H.264/AVC video content authentication based on manifold feature. KSII Trans. Internet Inf. Syst. 8(12), 4568–4587 (2014)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Obaid Ur-Rehman
    • 1
  • Natasa Zivic
    • 1
  1. 1.Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations