Counterfeiting attacks on block-wise dependent fragile watermarking schemes

H Nyeem, W Boles, C Boyd - … of the 6th International Conference on …, 2013 - dl.acm.org
Proceedings of the 6th International Conference on Security of Information …, 2013dl.acm.org
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile
watermarking schemes. We consider vulnerabilities such as the exploitation of a weak
correlation among block-wise dependent watermarks to modify valid watermarked images,
where they could still be verified as authentic, though they are actually not. Experimental
results successfully demonstrate the practicability and consequences of the proposed
attacks for some relevant schemes. The development of the proposed attack models can be …
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果