首页> 外文会议>Conference on security and watermarking of multimedia contents >Further attacks on Yeung-Mintzer fragile watermarking scheme
【24h】

Further attacks on Yeung-Mintzer fragile watermarking scheme

机译:进一步攻击杨永泽脆弱的水印方案

获取原文

摘要

In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.
机译:在本文中,我们描述了对先前由Yeung和Mintzer提出的认证方案的新的和改进的攻击。以前的攻击假设为用于认证的图像中插入的二进制水印徽标是已知的。在这里,我们删除了该假设并显示该方案如何仍然易受攻击,即使二进制徽标未知,但攻击者可以访问已使用相同秘密密钥进行水印的多个图像,并包含相同(但未知)徽标。我们提出了两次攻击。第一次攻击是秘密水印插入函数和二进制徽标,给定多个通过相同键认证的多个图像并包含相同的徽标。我们表明,可以使用少量作为两个图像来构建对徽标和水印插入功能的非常好的近似值。使用彩色图像,一个需要更多图像,尽管如此攻击仍然是可行的。我们展示的第二次攻击,我们称之为“拼贴攻击”是Holliman-Memon伪造攻击的变化。所提出的变化不需要了解水印标志,并通过我们开发的合适的抖动过程产生优异质量的假冒。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号