Paper
9 May 2000 Further attacks on Yeung-Mintzer fragile watermarking scheme
Author Affiliations +
Abstract
In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jessica Fridrich, Miroslav Goljan, and Nasir D. Memon "Further attacks on Yeung-Mintzer fragile watermarking scheme", Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000); https://doi.org/10.1117/12.384997
Lens.org Logo
CITATIONS
Cited by 61 scholarly publications and 1 patent.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Binary data

Diffusion

Databases

Image restoration

Image quality

Image processing

RELATED CONTENT


Back to Top