DocumentCode :
427091
Title :
Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes
Author :
Wu, Jinhai ; Zhu, Bin B. ; Li, Shipeng ; Lin, Fuzong
Author_Institution :
Stale Key Lab of Intelligent Tech. & Syst., Tsinghua Univ., Beijing
Volume :
2
fYear :
2004
fDate :
30-30 June 2004
Firstpage :
931
Abstract :
The Yeung-Mintzer (Y-M) image authentication scheme has been well studied. Several vulnerabilities and modified schemes to fix them have been reported. In this paper, we propose a novel oracle attack on the Y-M scheme and its variations. Our attack is very different from the previously proposed attacks. A single authenticated image plus access to a verifier (oracle) is enough in our attack. The verifier returns if a testing image is authentic or not. Locations of tampered pixels are not needed. To launch the attack, a single pixel is modified and the resulting image is sent to the verifier. Observation of outputs of the verifier is used to deduce the secret mapping functions and the embedded logo within an uncertainty of two possibilities. The deduced mapping functions are then used to modify the content of an authenticated image without detection or to authenticate an arbitrary image of the same size. Note that the logo is not used in the forgery so sophisticated protection of the logo cannot thwart the attack. Our attack is very efficient. Only 255 trials are needed to attack an 8-bit grayscale image and 765 trials for a 24-bit color image. The proposed attack can also be applied to attack pixel-wise variations of the Y-M scheme proposed to fix the previously reported vulnerabilities
Keywords :
data compression; data encapsulation; image coding; message authentication; multimedia communication; security of data; watermarking; 24 bit; 8 bit; Y-M scheme; Y-M scheme pixel-wise variations; Yeung-Mintzer authentication schemes; Yeung-Mintzer variant authentication schemes; arbitrary image size; authenticated image; authenticated image content modification; authentication scheme vulnerabilities; color image attack; efficient oracle attacks; embedded logo; forgery; grayscale image attack; image authentication; image verifier; logo protection; modified single pixel attack launch; secret mapping functions deduction; tampered pixel locations; testing image; verifier access; verifier output; Asia; Authentication; Color; Gray-scale; Pixel; Protection; Security; Testing; Uncertainty; Vector quantization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia and Expo, 2004. ICME '04. 2004 IEEE International Conference on
Conference_Location :
Taipei
Print_ISBN :
0-7803-8603-5
Type :
conf
DOI :
10.1109/ICME.2004.1394354
Filename :
1394354
Link To Document :
بازگشت