Certificate of authorization with watermark processing in computer system

Nai Wen Kuo, Huey Ming Lee, Tsang Yean Lee

Research output: Contribution to journalArticle

Abstract

We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.

Original languageEnglish
Pages (from-to)2003-2008
Number of pages6
JournalICIC Express Letters
Volume4
Issue number5 B
Publication statusPublished - Oct 1 2010
Externally publishedYes

Fingerprint

Cryptography
Computer systems
Processing

Keywords

  • Decrypt
  • Encrypt
  • Watermark

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Kuo, N. W., Lee, H. M., & Lee, T. Y. (2010). Certificate of authorization with watermark processing in computer system. ICIC Express Letters, 4(5 B), 2003-2008.

Certificate of authorization with watermark processing in computer system. / Kuo, Nai Wen; Lee, Huey Ming; Lee, Tsang Yean.

In: ICIC Express Letters, Vol. 4, No. 5 B, 01.10.2010, p. 2003-2008.

Research output: Contribution to journalArticle

Kuo, NW, Lee, HM & Lee, TY 2010, 'Certificate of authorization with watermark processing in computer system', ICIC Express Letters, vol. 4, no. 5 B, pp. 2003-2008.
Kuo, Nai Wen ; Lee, Huey Ming ; Lee, Tsang Yean. / Certificate of authorization with watermark processing in computer system. In: ICIC Express Letters. 2010 ; Vol. 4, No. 5 B. pp. 2003-2008.
@article{a9ef8057db3c4ad98499d1754a1380d2,
title = "Certificate of authorization with watermark processing in computer system",
abstract = "We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.",
keywords = "Decrypt, Encrypt, Watermark",
author = "Kuo, {Nai Wen} and Lee, {Huey Ming} and Lee, {Tsang Yean}",
year = "2010",
month = "10",
day = "1",
language = "English",
volume = "4",
pages = "2003--2008",
journal = "ICIC Express Letters",
issn = "1881-803X",
publisher = "ICIC Express Letters Office",
number = "5 B",

}

TY - JOUR

T1 - Certificate of authorization with watermark processing in computer system

AU - Kuo, Nai Wen

AU - Lee, Huey Ming

AU - Lee, Tsang Yean

PY - 2010/10/1

Y1 - 2010/10/1

N2 - We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.

AB - We propose the safe treatment of the certificate of authorization in computer system. We insert the watermark in the certificate of authorization. We set encryption data tables and use them to encrypt the combined file of the certificate of authorization and watermark to produce these files of cipher text. Both of the owner and grantee keep their encrypted files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The processes that the certificate of authorization is encrypted and decrypted will be safer.

KW - Decrypt

KW - Encrypt

KW - Watermark

UR - http://www.scopus.com/inward/record.url?scp=77956904256&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77956904256&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:77956904256

VL - 4

SP - 2003

EP - 2008

JO - ICIC Express Letters

JF - ICIC Express Letters

SN - 1881-803X

IS - 5 B

ER -