Security of an ill-posed operator based scheme for image authentication
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate...
Saved in:
Main Authors: | WU, Yongdong, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/193 https://ink.library.smu.edu.sg/context/sis_research/article/1192/viewcontent/Security_of_an_ill_posed_operator_based_scheme_for_image_authentication.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
AA Flexible and Scalable Authentication Scheme for JPEG 2000 Image Codestreams
by: PENG, Cheng, et al.
Published: (2003) -
A hybrid scheme for authenticating scalable video codestreams
by: WEI, Zhuo, et al.
Published: (2014) -
Tailored watermarking schemes for authentication of electronic clinical atlases
by: BAO, Feng, et al.
Published: (2005) -
Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
by: LIU, Ximming, et al.
Published: (2018) -
Secure Human Communications Based on Biometrics Signals
by: WU, Yongdong, et al.
Published: (2005)