Cryptanalysis of the Yeung-Mintzer fragile watermarking technique

被引:69
作者
Fridrich, J [1 ]
Goljan, M
Memon, N
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
[2] SUNY Binghamton, Dept Elect Engn, Binghamton, NY 13902 USA
[3] Polytech Univ, Dept Comp Sci, Brooklyn, NY 11201 USA
基金
美国国家科学基金会;
关键词
D O I
10.1117/1.1459449
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digital watermarks have been proposed in the literature. In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered authentic. We present two attacks. The first attack infers the secret watermark insertion function. This enables an attacker to embed a valid watermark in any image. The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function) and contain the same watermark. We show simulation results in which the watermark and the watermark insertion function can be mostly reconstructed in a few (1-5) minutes of computation, using as few as two images. The second attack we present, which we call the "collage attack" is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a sophisticated dithering process. (C) 2002 SPIE and IST.
引用
收藏
页码:262 / 274
页数:13
相关论文
共 17 条
[1]  
BHATTACHARJEE S, 1998, P INT C IM PROC CHIC
[2]   A review of watermarking and the importance of perceptual modeling [J].
Cox, IJ ;
Miller, ML .
HUMAN VISION AND ELECTRONIC IMAGING II, 1997, 3016 :92-99
[3]  
ERDELYI A, 1956, ASYMPTOTIC EXPANSION, P36
[4]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[5]  
MEMON N, 1999, P PICS C SAV GEORG
[6]  
Metnon N., 1998, COMMUN ACM, V47, P35
[7]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[8]  
Rivest Ronald L., 1992, 1321 RFC
[9]  
SCHNEIDER M, 1996, P ICIP LAUS SWITZ SE
[10]  
SIMMONS G, 1992, CONT CRYPTOGRAPHY SC