Share Email Print

Proceedings Paper

New attacks on SARI image authentication system
Author(s): Jinhai Wu; Bin Benjamin Zhu; Shipeng Li; Fuzong Lin
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between any two DCT coefficients and the same mean values of DCT coefficients. Such a modified image can pass the SARI authentication system. The second attack is an oracle attack which uses an oracle to efficiently find the secret pairs used by SARI in its signature generation. A single image plus an oracle is needed to launch the oracle attack. Fixes to thwart the proposed attacks are also proposed in this paper.

Paper Details

Date Published: 22 June 2004
PDF: 8 pages
Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, (22 June 2004); doi: 10.1117/12.526636
Show Author Affiliations
Jinhai Wu, Tsinghua Univ. (China)
Bin Benjamin Zhu, Microsoft Research Asia (China)
Shipeng Li, Microsoft Research Asia (China)
Fuzong Lin, Tsinghua Univ. (China)

Published in SPIE Proceedings Vol. 5306:
Security, Steganography, and Watermarking of Multimedia Contents VI
Edward J. Delp III; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?