Paper
22 June 2004 Malicious attacks on media authentication schemes based on invertible watermarks
Author Affiliations +
Abstract
The increasing availability and distribution of multimedia technology has made the manipulation of digital images, videos or audio files easy. While this enables numerous new applications, a certain loss of trust in digital media can be observed. In general, there is no guarantee that a digital image "does not lie", i.e., that the image content was not altered. To counteract this risk, fragile watermarks were proposed to protect the integrity of digital multimedia objects. In high security applications, it is necessary to be able to reconstruct the original object out of the watermarked version. This can be achieved by the use of invertible watermarks. While traditional watermarking schemes introduce some small non-invertible distortion in the digital content, invertible watermarks can be completely removed from a watermarked work. In the past, the security of proposed image authentication schemes based on invertible watermarks was only analyzed using ad-hoc methods and neglected the possibility of malicious attacks, which aim at engineering a fake mark so that the attacked object appears to be genuine. In this paper, we characterize and analyze possible malicious attacks against watermark-based image authentication systems and explore the theoretical limits of previous constructions with respect to their security.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stefan Katzenbeisser and Jana Dittmann "Malicious attacks on media authentication schemes based on invertible watermarks", Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); https://doi.org/10.1117/12.525721
Lens.org Logo
CITATIONS
Cited by 7 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Multimedia

Imaging devices

Computer security

Distortion

Symmetric-key encryption

Reconstruction algorithms

RELATED CONTENT

Invertible authentication for 3D meshes
Proceedings of SPIE (June 20 2003)
Real-time video watermarking technique
Proceedings of SPIE (April 29 2002)
Distortion-bounded authentication techniques
Proceedings of SPIE (May 09 2000)
Research on image scrambling degree evaluation method
Proceedings of SPIE (February 20 2006)

Back to Top