Counterfeiting attack on a lossless authentication watermarking scheme

  • Authors:
  • Yongdong Wu;Changsheng Xu;Feng Bao

  • Affiliations:
  • Institute for Infocomm Research, Singapore;Institute for Infocomm Research, Singapore;Institute for Infocomm Research, Singapore

  • Venue:
  • VIP '02 Selected papers from the 2002 Pan-Sydney workshop on Visualisation - Volume 22
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes an effective attack on a lossless authentication watermarking scheme [Fridrich et. al 2001]. Given sufficient number of pairs of stego-images and its cover-images, an attacker can obtain the data (e.g., random walk sequence, lookup table) generated from a secret key. With these data, the attacker can easily forge authentic images. The experiment demonstrates this attack is very efficient to the lossless watermarking scheme. To avoid such attack, we modify the process of lookup table generation so that the table is variable with the content of the cover-image.