Nonlinear collusion attack on a watermarking scheme for buyer authentication

被引:0
|
作者
Wu, Yongdong [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
authentication watermarking; collusion attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an adaptive collusion attack on a buyer authentication watermarking scheme. To accomplish this attack, the traitors (i.e., dishonest buyers) select the pixels of their watermarked images generated from the same original image and average the selected pixels so as to remove the watermark information. Additionally, the forged image is of higher quality than any watermarked image. Both theoretical and experimental results demonstrate that our attack is very effective.
引用
收藏
页码:626 / 629
页数:4
相关论文
共 50 条
  • [1] Adaptive collusion attack to a block oriented watermarking scheme
    Wu, YD
    Deng, R
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 238 - 248
  • [2] Collusion attack resistant watermarking scheme for images using DCT
    Saxena, Vikas
    Gupta, J. P.
    2007 IEEE 15TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1-3, 2007, : 205 - 208
  • [3] Interactive authentication scheme against collusion attack for virtual enterprises
    Zhang, Ya-Ling
    Zhang, Jing
    Wang, Xiao-Feng
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (07): : 1410 - 1416
  • [4] Collusion Attack Resistant SVD based Secured Audio Watermarking Scheme with Chaotic Encryption
    Tewari, Tribhuwan Kumar
    Saxena, Vikas
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 304 - 308
  • [5] Collusion attack-resistant watermarking scheme using correlation peak position modulation
    Nah, Jihah
    Kim, Jongweon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14917 - 14926
  • [6] Collusion attack-resistant watermarking scheme using correlation peak position modulation
    Jihah Nah
    Jongweon Kim
    Multimedia Tools and Applications, 2016, 75 : 14917 - 14926
  • [7] Inversion attack resilient zero-watermarking scheme for medical image authentication
    Vellaisamy, Seenivasagam
    Ramesh, Velumani
    IET IMAGE PROCESSING, 2014, 8 (12) : 718 - 727
  • [8] A collusion-resistant video watermarking scheme
    Houmansadr, Amir
    Ghaemmaghami, Shahrokh
    INFORMATION HIDING, 2007, 4437 : 343 - +
  • [9] A Collusion Attack on the Fuzzy Vault Scheme
    Poon, Hoi Ting
    Miri, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (01): : 27 - 34
  • [10] A Novel Method to Reduce Collusion Attack Possibility on Watermarking
    Boroujerdizadeh, A.
    Ghobadi, A. R.
    Yaribakht, A. H.
    Bin Abdoullah, M. Shahidan
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1066 - 1071