Secure Communication: A Proposed Public Key Watermark System

Secure Communication: A Proposed Public Key Watermark System

Shadi R. Masadeh (Department of Computer Networks , Al-Isra University, Amman, Jordan,), Shadi Aljawarneh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Ashraf Odeh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan) and Abdullah Alhaj (Faculty of Information Technology, University of Jordan, Aqaba, Jordan)
Copyright: © 2013 |Pages: 10
DOI: 10.4018/ijisp.2013100101


The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
Article Preview

In this section, we discuss the cryptography method and approaches, and watermarking techniques that assist to secure the web content.

The history of cryptography dates returns to the earliest recorded instances of man. About 1900 BC an Egyptian scribe used non-standard hieroglyphs in an inscription. Kahn lists this as the first documented example of written cryptography Menezes, A., van Oorschot, P., and Vanstone, S. (2008).

Cryptography is both the lock and the combination (or key) that can be used to help protect your data. There are a variety of cryptographic methods and keys. Together, the method and the key determine cryptographic security Menezes A., van Oorschot P. and Vanstone S.(2008).

Below are some of the most commonly used schemes that appeared through cryptography history:

Complete Article List

Search this Journal:
Open Access Articles
Volume 13: 4 Issues (2019): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing