Share Email Print

Proceedings Paper

Further attacks on Yeung-Mintzer fragile watermarking scheme
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

Paper Details

Date Published: 9 May 2000
PDF: 10 pages
Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000); doi: 10.1117/12.384997
Show Author Affiliations
Jessica Fridrich, SUNY/Binghamton (United States)
Miroslav Goljan, SUNY/Binghamton (United States)
Nasir D. Memon, Polytechnic Univ. (United States)

Published in SPIE Proceedings Vol. 3971:
Security and Watermarking of Multimedia Contents II
Ping Wah Wong; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?