Security of an Ill-Posed Operator Based Scheme for Image Authentication
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.
Information Security and Trust
IEEE Transactions on Circuits and Systems for Video Technology
WU, Yongdong and DENG, Robert H..
Security of an Ill-Posed Operator Based Scheme for Image Authentication. (2004). IEEE Transactions on Circuits and Systems for Video Technology. 5, (1), 161-163. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/193