Nonlinear collusion attack on a watermarking scheme for buyer authentication

被引:0
|
作者
Wu, Yongdong [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
authentication watermarking; collusion attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an adaptive collusion attack on a buyer authentication watermarking scheme. To accomplish this attack, the traitors (i.e., dishonest buyers) select the pixels of their watermarked images generated from the same original image and average the selected pixels so as to remove the watermark information. Additionally, the forged image is of higher quality than any watermarked image. Both theoretical and experimental results demonstrate that our attack is very effective.
引用
收藏
页码:626 / 629
页数:4
相关论文
共 50 条
  • [11] Dual Watermarking Scheme For Secure Buyer-Seller Watermarking Protocol
    Mehra, Neelesh
    Shandilya, Madhu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [12] Spatial domain digital watermarking of multimedia objects for buyer authentication
    Mukherjee, DP
    Maitra, S
    Acton, ST
    IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (01) : 1 - 15
  • [13] Robust buyer authentication scheme for multimedia object
    Mukherjee, DP
    Maitra, S
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 97 - 100
  • [14] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [15] Invertible watermarking scheme for authentication and integrity
    Yoo, KS
    Kim, MA
    Lee, WH
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 371 - 381
  • [16] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [17] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [18] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [19] A hybrid watermarking scheme for video authentication
    Liu, Hongmei
    Zhu, Ling
    Huang, Jiwu
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2569 - +
  • [20] Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
    Zhao, Bin
    Kou, Weidong
    Li, Hui
    Dang, Lanjun
    Zhang, Jun
    INFORMATION SCIENCES, 2010, 180 (23) : 4672 - 4684