Nonlinear collusion attack on a watermarking scheme for buyer authentication

被引:0
|
作者
Wu, Yongdong [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
authentication watermarking; collusion attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an adaptive collusion attack on a buyer authentication watermarking scheme. To accomplish this attack, the traitors (i.e., dishonest buyers) select the pixels of their watermarked images generated from the same original image and average the selected pixels so as to remove the watermark information. Additionally, the forged image is of higher quality than any watermarked image. Both theoretical and experimental results demonstrate that our attack is very effective.
引用
收藏
页码:626 / 629
页数:4
相关论文
共 50 条
  • [21] Attack on quantized projection watermarking scheme
    Liao, XW
    Lu, ZM
    Sun, Z
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 6366 - 6369
  • [22] A watermarking scheme robust to IBM Attack
    Kim, JH
    Lee, WD
    Park, JH
    MULTIMEDIA INFORMATION SYSTEMS IN PRACTICE, 1999, : 215 - 218
  • [23] Robustness Evaluation of Spread-Spectrum Watermarking Against Collusion Attack
    Sakai, Yasuhiro
    Mimura, Kazushi
    JOURNAL OF THE PHYSICAL SOCIETY OF JAPAN, 2012, 81 (03)
  • [24] A blind video watermarking scheme resistant to rotation and collusion attacks
    Karmakar, Amlan
    Phadikar, Amit
    Phadikar, Baisakhi Sur
    Maity, Goutam Kr.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (02) : 199 - 210
  • [25] Collusion attack to a scalable AND-ACC fingerprinting scheme
    Wu, Yongdong
    Zhao, Zhigang
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2007, PTS 1 AND 2, 2007, 6508
  • [26] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [27] A Dynamic Watermarking Scheme for Color Image Authentication
    Bandyopadhyay, Pradosh
    Das, Soumik
    Paul, Shauvik
    Chaudhuri, Atal
    Banerjee, Monalisa
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 314 - +
  • [28] Chaotic watermarking scheme for authentication of JPEG images
    Wang, Hongxia
    Ding, Ke
    Liao, Changxing
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 53 - +
  • [29] A Lossless Watermarking Scheme for Halftone Image Authentication
    Pan, Jeng-Shyang
    Luo, Hao
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 147 - 151
  • [30] Database authentication watermarking scheme in encrypted domain
    Xiang, Shijun
    He, Jiayong
    IET INFORMATION SECURITY, 2018, 12 (01) : 42 - 51