Share Email Print

Proceedings Paper

Fault-induced attack on semi-fragile image authentication schemes
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This paper describes an attack on semi-fragile image authentication schemes proposed in papers. In this attack, the adversary manipulates an authentic image and queries a verifier with the corrupted image. According to the answers from the verifier, the adversary can disclose the secret relationship graphs used to produce a signature. With the disclosed relationship graphs, the adversary can impersonate an innocent person to forge authentic images easily. A countermeasure to this attack is to change scheme parameters with the relationship edges so that the relationship graphs reconstructed by the attacker are different from the original one. Sequentially, the attacker is hard to forge an authentic image without correct relationship graphs.

Paper Details

Date Published: 23 June 2003
PDF: 9 pages
Proc. SPIE 5150, Visual Communications and Image Processing 2003, (23 June 2003); doi: 10.1117/12.501824
Show Author Affiliations
Yongdong Wu, Institute for Infocomm Research (Singapore)
Changsheng Xu, Institute for Infocomm Research (Singapore)

Published in SPIE Proceedings Vol. 5150:
Visual Communications and Image Processing 2003
Touradj Ebrahimi; Thomas Sikora, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?