【24h】

New Attacks on Sari Image Authentication System

机译:Sari图像认证系统的新攻击

获取原文
获取原文并翻译 | 示例

摘要

The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between any two DCT coefficients and the same mean values of DCT coefficients. Such a modified image can pass the SARI authentication system. The second attack is an oracle attack which uses an oracle to efficiently find the secret pairs used by SARI in its signature generation. A single image plus an oracle is needed to launch the oracle attack. Fixes to thwart the proposed attacks are also proposed in this paper.
机译:Lin和Chang提出的图像认证系统SARI通过JPEG压缩,并拒绝了其他恶意操作。最近已经报告了该系统的某些漏洞。在本文中,我们提出了两种可能危害SARI系统的新攻击。第一次攻击称为直方图攻击,它会修改DCT系数,但仍保持任意两个DCT系数之间的相同关系以及DCT系数的相同平均值。这样的修改后的图像可以通过SARI身份验证系统。第二种攻击是预言攻击,它使用预言来有效地查找SARI在其签名生成中使用的秘密对。要启动oracle攻击,需要一个映像和一个oracle。本文还提出了一些旨在阻止所提议的攻击的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号