Publication Type

Journal Article

Version

publishedVersion

Publication Date

1-2005

Abstract

This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.

Discipline

Information Security

Research Areas

Information Security and Trust

Publication

IEEE Transactions on Circuits and Systems for Video Technology

Volume

5

Issue

1

First Page

161

Last Page

163

ISSN

1051-8215

Identifier

10.1109/TCSVT.2004.839978(410) 1

Publisher

IEEE

Additional URL

https://doi.org/10.1109/TCSVT.2004.839978

Share

COinS