Toward secure public-key blockwise fragile authentication watermarking

被引:64
作者
Barreto, PSLM
Kim, HY
Rijmen, V
机构
[1] Univ Sao Paulo, Escola Politecn, BR-05508900 Sao Paulo, Brazil
[2] Cryptomath, B-3000 Louvain, Belgium
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2002年 / 149卷 / 02期
关键词
D O I
10.1049/ip-vis:20020168
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authors describe some weaknesses of public-key blockwise fragile authentication watermarkings and the means to make them secure. Wong's original algorithm as well as a number of its variant techniques are not secure against a mere block cut-and-paste or the well known birthday attack. To make them secure, some schemes have been proposed to make the signature of each block depend on the contents of its neighbouring blocks. The authors attempt to maximise the change localisation resolution using only one dependency per block with a scheme they call hash block chaining version 1 (HBC1). They then show that HBC1, as well as any neighbour content-dependent scheme, are susceptible to another forgery technique that they have named a transplantation attack. They also show a new kind of birthday attack that can be effectively mounted against HBC1. To thwart these attacks, they propose using a nondeterministic digital signature together with a signature-dependent scheme (HBC2). Finally, they discuss the advantages of using discrete logarithm signatures instead of RSA for watermarking.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 12 条
[1]  
BARRETO PS, 1999, P 12 IEEE BRAZ S COM, P241
[2]  
BARRETO PSL, 2001, P IEEE INT C IM PROC, V2, P1093
[3]  
BARRETO PSL, 2000, P S BRAS TEL
[4]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[5]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[6]   Image authentication and integrity verification via content-based watermarks and a public key cryptosystem [J].
Li, CT ;
Lou, DC ;
Chen, TH .
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, :694-697
[7]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[8]  
Nishimura K., 1990, Journal of Cryptology, V2, P13, DOI 10.1007/BF02252867
[9]  
Wong PW, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P455, DOI 10.1109/ICIP.1998.723526
[10]  
WONG PW, 1997, P IS T PIC C PROTL O