مشخصات کلی مقاله
عنوان مقاله: Counterfeiting Attack on Adjusted Expanded-bit Multiscale Quantization-based Semi-fragile Watermarking Technique
نویسنده: خانم سمیرا حسینی
تحت نظارت دکتر مجتبی مهدوی عضو هیات علمی دانشکده مهندسی کامپیوتر دانشگاه اصفهان
محل انتشار: 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology - ISCISC
تاریخ پذیرش مقاله: 7 سپتامبر2016
طرح ترجمه: ترجمه طلایی فارسی به انگلیسی
چکیده مقاله ترجمه شده
Semi-fragile watermarking methods are mainly characterized by their robustness against unintentional attacks such as regular image processing and their fragility against intentional attacks aiming to alter signal contents. Thus, these methods need to provide correct robustness and fragility. However, numerous factors impede the achievement of these two objectives. The fact that the watermark is not dependent on the content of the image (the medium considered in this study) and also the semi-fragile method is not block-wise dependent, make the method vulnerable to intentional attacks. Recently, an image authentication method has been proposed, which despite the use of a secret key in generating the watermark, suffers from the preceding vulnerabilities. Thus, in this paper we aim to present a counterfeiting attack and demonstrate that the method is not even fragile against complete counterfeiting, making it incapable of detecting image tampering. Essentially, the proposed attack enables the attacker to counterfeit the watermarks belonging to any number of 4×4 blocks and embed them in arbitrary blocks. The results indicate that the proposed attack successfully deceives the method.
دریافت مقاله از ieee
درباره نویسنده ها
دکتر مجتبی مهدوی
- دکتری,مهندسی کامپیوتر,دانشگاه صنعتی اصفهان
- عضو هیأت علمی گروه مهندسی فناوری اطلاعات دانشگاه اصفهان
- کارشناس ارشد مهندسی فناوری اطلاعات - گرایش امنیت اطلاعات از دانشگاه اصفهان
The objective of ISCISC’2016 is to bring together researchers, engineers, and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory, emerging technologies, and progress in standards, services and their applications in various areas of information security. ISCISC’2016 encourages researchers, developers, and practitioners to submit their original papers, and organize workshops on various new emerging topics. Industrial exhibitions are held in conjunction with the main conference.