Sciweavers

Share
JEI
2002

Cryptanalysis of the Yeung - Mintzer fragile watermarking technique

8 years 9 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digital watermarks have been proposed in the literature. In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered as authentic. We present two attacks. The first attack infers the secret watermark insertion function. This enables an attacker to embed a valid watermark in any image. The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function) and contain the same watermark. We show simulation results where the watermark and the watermark insertion function ca...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
Added 22 Dec 2010
Updated 22 Dec 2010
Type Journal
Year 2002
Where JEI
Authors Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
Comments (0)
books