Security of fragile authentication watermarks with localization

被引:109
作者
Fridrich, J [1 ]
机构
[1] SUNY Binghamton, TJ Watson Sch Engn, Dept Elect Engn, Binghamton, NY 13902 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
authentication; fragile watermarks; attacks; security; Holliman-Memon attack; localization;
D O I
10.1117/12.465330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme(18) that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack(9). In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.
引用
收藏
页码:691 / 700
页数:10
相关论文
共 21 条
[1]  
CELIK M, 2001, P ICIP 2001 THESS GR
[2]   Fragile imperceptible digital watermark with privacy control [J].
Coppersmith, D ;
Mintzer, F ;
Tresser, C ;
Wu, CW ;
Yeung, MM .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :79-84
[3]   Visual hash for oblivious watermarking [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :286-294
[4]  
FRIDRICH J, 2000, P ICIP VANC CAN SEP
[5]  
FRIDRICH J, 2000, P SPIE SEC WAT MULT, P428
[6]  
FRIDRICH J, 2000, UNPUB J EL IM MAR
[7]  
FRIDRICH J, 2001, 4 INF HID WORKSH PIT
[8]  
FRIEDMAN GL, 1993, IEEE T CONSUM ELECTR, V39, P404
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]  
KUNDUR D, 1998, P ICIP CHIC ILL OCT