Security of an ill-posed operator based scheme for image authentication
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/193 https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1192 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-11922019-04-01T09:10:10Z Security of an ill-posed operator based scheme for image authentication WU, Yongdong DENG, Robert H. This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective. 2005-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/193 info:doi/10.1109/TCSVT.2004.839978(410) 1 https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security |
spellingShingle |
Information Security WU, Yongdong DENG, Robert H. Security of an ill-posed operator based scheme for image authentication |
description |
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective. |
format |
text |
author |
WU, Yongdong DENG, Robert H. |
author_facet |
WU, Yongdong DENG, Robert H. |
author_sort |
WU, Yongdong |
title |
Security of an ill-posed operator based scheme for image authentication |
title_short |
Security of an ill-posed operator based scheme for image authentication |
title_full |
Security of an ill-posed operator based scheme for image authentication |
title_fullStr |
Security of an ill-posed operator based scheme for image authentication |
title_full_unstemmed |
Security of an ill-posed operator based scheme for image authentication |
title_sort |
security of an ill-posed operator based scheme for image authentication |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2005 |
url |
https://ink.library.smu.edu.sg/sis_research/193 https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf |
_version_ |
1770568915763593216 |