EconPapers    
Economics at your fingertips  
 

Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication

Jia-Hong Li, Tzung-Her Chen and Wei-Bin Lee
Additional contact information
Jia-Hong Li: Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan
Tzung-Her Chen: Department of Computer Science and Information Engineering, National Chiayi University, Chia-Yi City, Taiwan
Wei-Bin Lee: Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan

International Journal of Digital Crime and Forensics (IJDCF), 2014, vol. 6, issue 3, 30-46

Abstract: Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack†. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.

Date: 2014
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/ijdcf.2014070103 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jdcf00:v:6:y:2014:i:3:p:30-46

Access Statistics for this article

More articles in International Journal of Digital Crime and Forensics (IJDCF) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jdcf00:v:6:y:2014:i:3:p:30-46