Nonlinear collusion attack on a watermarking scheme for buyer authentication

被引:0
|
作者
Wu, Yongdong [1 ]
机构
[1] Inst Infocomm Res, Singapore 119613, Singapore
关键词
authentication watermarking; collusion attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an adaptive collusion attack on a buyer authentication watermarking scheme. To accomplish this attack, the traitors (i.e., dishonest buyers) select the pixels of their watermarked images generated from the same original image and average the selected pixels so as to remove the watermark information. Additionally, the forged image is of higher quality than any watermarked image. Both theoretical and experimental results demonstrate that our attack is very effective.
引用
收藏
页码:626 / 629
页数:4
相关论文
共 50 条
  • [41] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [42] Hierarchical watermarking scheme for image authentication and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 963 - 966
  • [43] A robust buyer-seller watermarking scheme based on DWT
    Lou, DC
    Shieh, JM
    Tso, HX
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2006, 20 (01) : 79 - 90
  • [44] Watermarking scheme capable of resisting sensitivity attack
    Zhang, Xinpeng
    Wang, Shuozhong
    IEEE SIGNAL PROCESSING LETTERS, 2007, 14 (02) : 125 - 128
  • [45] Collusion Attack Resilient 3D Mesh Watermarking Based on Anti-Collusion Fingerprint Code
    Hou, Jong-Uk
    Yu, In-Jae
    Lee, Heung-Kyu
    APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [46] Recaptured attack-resilient watermarking scheme
    Mehta, Preeti
    Singh, Mahesh K.
    Singha, Nitin
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [47] A Realistic Attack on SVD Based Watermarking Scheme
    Naderahmadian, Yashar
    Beheshti, Soosan
    2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 1238 - 1242
  • [48] Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication
    Li, Jia-Hong
    Chen, Tzung-Her
    Lee, Wei-Bin
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (03) : 30 - 46
  • [49] Secure authentication watermarking for localization against the Holliman–Memon attack
    Niladri B. Puhan
    Anthony T. S. Ho
    Multimedia Systems, 2007, 12 : 521 - 532
  • [50] A Key-Recovery Attack on Authentication Watermarking by Li and Yuan
    Schaathun, Hans Georg
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 221 - 225