Fingerprint forensics application protocol: semi-automated modeling and verification of watermark-based communication using CASPER and FDR

  • Authors:
  • Ronny Merkel;Christian Kraetzer;Robert Altschaffel;Eric Clausing;Maik Schott;Jana Dittmann

  • Affiliations:
  • Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany;Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany;Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany;Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany;Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany;Department of Computer Science, Research Group Multimedia and Security, Otto-von-Guericke-University of Magdeburg, Germany

  • Venue:
  • IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, the technique of semi-automated protocol verification using model-checkers was transferred from cryptography to the domain of watermark-based communication protocols. This technique offers cost-effective security verification of such watermark-based protocols and an increased flexibility in comparison to traditionally applied, manual mathematical proofs. In this paper, we want to evaluate the feasibility of this approach, using the modeling language CASPER and the model-checker FDR. We extract the prospects and limitations of the approach by modeling and verifying a practical application scenario for forensic investigations using high-resolution biometric fingerprint data. We evaluate the security aspects, which can be verified by the scheme, as well as the syntactical limitations, complexity limitations and the methodological limitations and indentify necessary improvements for a practical usage of such scheme.