Methods for image authentication: a survey
Multimedia Tools and Applications
A secure and robust hash-based scheme for image authentication
Signal Processing
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Computers and Electrical Engineering
Hi-index | 0.00 |
We investigate the image authentication system SARI, proposed by Lin and Chang (see ibid., vol.11, p.153-68, Feb. 2001), that distinguishes JPEG compression from malicious manipulations. In particular, we took at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he can cause arbitrary images to be authenticated with this same but unknown key. We show that the number of such images needed by Oscar to launch a successful attack is quite small, making the attack very practical. We then suggest possible solutions to enhance the security of this authentication system.