Cryptanalysis of the Yeung - Mintzer fragile watermarking technique

نویسندگان

  • Jessica J. Fridrich
  • Miroslav Goljan
  • Nasir D. Memon
چکیده

The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digital watermarks have been proposed in the literature. In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered as authentic. We present two attacks. The first attack infers the secret watermark insertion function. This enables an attacker to embed a valid watermark in any image. The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function) and contain the same watermark. We show simulation results where the watermark and the watermark insertion function can be mostly re-constructed in a few (1-5) minutes of computation, using as few as two images. The second attack we present, which we call the “collage-attack” is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a sophisticated dithering process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of the Yeung Mintzer Authentication Watermark

The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digital watermarks have been proposed in the literature. In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique. We show that under some conditions the Yeung-Mintzer technique is s...

متن کامل

Fragile watermark based on polarity of pixel points

A fragile watermarking scheme for authenticating images based on the Yeung-Mintzer scheme is proposed in this paper. This scheme does provide a better protection against all the attacks proposed for Yeung-Mintzer scheme. A polar set derived from the image blocks is used in the embedding process. The center pixel values of image blocks are perturbed by small quantities in such a way that the per...

متن کامل

Further attacks on Yeung-Mintzer fragile watermarking scheme

In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer [1]. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to mul...

متن کامل

Fragile Watermarking of Three-Dimensional Objects

There has recently been many work on watermarking of 2D images and video. However, watermarking of threedimensional (3D) objects has received little attentions. In this paper, we introduce and investigate the watermarking of three-dimensional (3D) objects as compared to 2D images, study the watermarking of objects represented by polygonal models, and, propose a new fragile watermarking techniqu...

متن کامل

Fragile Watermarking using Chaotic Sequences

In this article we propose a new fragile watermarking algorithm that provides the means to verify the integrity of JPEG images. We begin by presenting the cryptanalysis of CWSA (Chaotic Watermarking Scheme for the Authentication of JPEG Images), an existing fragile watermarking algorithm. We analyse its weaknesses and we propose a new version that is resistant to those attacks, faster and less ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Electronic Imaging

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2002