Publication Type
Journal Article
Version
publishedVersion
Publication Date
1-2005
Abstract
This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.
Discipline
Information Security
Research Areas
Information Security and Trust
Publication
IEEE Transactions on Circuits and Systems for Video Technology
Volume
5
Issue
1
First Page
161
Last Page
163
ISSN
1051-8215
Identifier
10.1109/TCSVT.2004.839978(410) 1
Publisher
IEEE
Citation
WU, Yongdong and DENG, Robert H..
Security of an ill-posed operator based scheme for image authentication. (2005). IEEE Transactions on Circuits and Systems for Video Technology. 5, (1), 161-163.
Available at: https://ink.library.smu.edu.sg/sis_research/193
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/TCSVT.2004.839978