Title :
Security of an ill-posed operator for image authentication
Author :
Yongdong Wu ; Deng, R.H.
Author_Institution :
Inst. for Infocomm Res., Singapore
Abstract :
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.
Keywords :
image processing; probability; watermarking; ill-posed operator security; image authentication scheme; random forgery; watermarking; Authentication; Cryptography; Forgery; Image analysis; Image generation; Image recognition; Matrix decomposition; Pixel; Security; Watermarking; Image authentication; random forgery;
Journal_Title :
Circuits and Systems for Video Technology, IEEE Transactions on
DOI :
10.1109/TCSVT.2004.839978