首页> 外文会议>Conference on security and watermarking of multimedia contents >Further attacks on Yeung-Mintzer fragile watermarking scheme
【24h】

Further attacks on Yeung-Mintzer fragile watermarking scheme

机译:对杨明哲脆弱的水印方案的进一步攻击

获取原文

摘要

Abstract: In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop. !5
机译:摘要:在本文中,我们描述了Yeung和Mintzer先前提出的对身份验证方案的新的和改进的攻击。以前的攻击都假定已知在身份验证中插入图像中的二进制水印徽标。在这里,我们删除了该假设,并显示了该方案仍是易受攻击的,即使二进制徽标未知,但攻击者也可以访问已使用相同秘密密钥加水印并包含相同(但未知)徽标的多个图像。我们提出两次攻击。给定使用同一密钥认证并包含相同徽标的多个图像,第一次攻击将推断出秘密水印插入功能和二进制徽标。我们展示了使用最少两个图像就可以很好地近似徽标和水印插入功能。对于彩色图像,需要更多的图像,但是这种攻击仍然可行。我们提出的第二种攻击,我们称为“拼贴攻击”,是霍利曼-蒙蒙(Holliman-Memon)假冒攻击的一种变体。拟议的变体形式不需要水印徽标,并且可以通过我们开发的合适的抖动处理方法来制作出质量较高的仿冒品。 !5

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号