Security of an ill-posed operator based scheme for image authentication

This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: WU, Yongdong, DENG, Robert H.
التنسيق: text
اللغة:English
منشور في: Institutional Knowledge at Singapore Management University 2005
الموضوعات:
الوصول للمادة أونلاين:https://ink.library.smu.edu.sg/sis_research/193
https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.