Security of an ill-posed operator based scheme for image authentication

This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate...

Full description

Saved in:
Bibliographic Details
Main Authors: WU, Yongdong, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2005
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/193
https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1192
record_format dspace
spelling sg-smu-ink.sis_research-11922019-04-01T09:10:10Z Security of an ill-posed operator based scheme for image authentication WU, Yongdong DENG, Robert H. This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective. 2005-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/193 info:doi/10.1109/TCSVT.2004.839978(410) 1 https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
WU, Yongdong
DENG, Robert H.
Security of an ill-posed operator based scheme for image authentication
description This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.
format text
author WU, Yongdong
DENG, Robert H.
author_facet WU, Yongdong
DENG, Robert H.
author_sort WU, Yongdong
title Security of an ill-posed operator based scheme for image authentication
title_short Security of an ill-posed operator based scheme for image authentication
title_full Security of an ill-posed operator based scheme for image authentication
title_fullStr Security of an ill-posed operator based scheme for image authentication
title_full_unstemmed Security of an ill-posed operator based scheme for image authentication
title_sort security of an ill-posed operator based scheme for image authentication
publisher Institutional Knowledge at Singapore Management University
publishDate 2005
url https://ink.library.smu.edu.sg/sis_research/193
https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf
_version_ 1770568915763593216