Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication

Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication

Jia-Hong Li, Tzung-Her Chen, Wei-Bin Lee
Copyright: © 2014 |Volume: 6 |Issue: 3 |Pages: 17
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466653498|DOI: 10.4018/ijdcf.2014070103
Cite Article Cite Article

MLA

Li, Jia-Hong, et al. "Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication." IJDCF vol.6, no.3 2014: pp.30-46. http://doi.org/10.4018/ijdcf.2014070103

APA

Li, J., Chen, T., & Lee, W. (2014). Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication. International Journal of Digital Crime and Forensics (IJDCF), 6(3), 30-46. http://doi.org/10.4018/ijdcf.2014070103

Chicago

Li, Jia-Hong, Tzung-Her Chen, and Wei-Bin Lee. "Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication," International Journal of Digital Crime and Forensics (IJDCF) 6, no.3: 30-46. http://doi.org/10.4018/ijdcf.2014070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.