Skip to main navigation Skip to search Skip to main content

Security of fragile authentication watermarks with localization

Research output: Contribution to journalConference articlepeer-review

187 Scopus citations

Abstract

In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.

Original languageEnglish
Pages (from-to)691-700
Number of pages10
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume4675
DOIs
StatePublished - 2002
EventSecurity and Watermarking of Multimedia Contents IV - San Jose, CA, United States
Duration: Jan 21 2002Jan 24 2002

Keywords

  • Attacks
  • Authentication
  • Fragile watermarks
  • Holliman-Memon attack
  • Localization
  • Security

Fingerprint

Dive into the research topics of 'Security of fragile authentication watermarks with localization'. Together they form a unique fingerprint.

Cite this