WATERMARKING

Cryptanalysis of the Yeung–Mintzer fragile watermarking technique

[+] Author Affiliations
Jessica Fridrich

SUNY Binghamton, Department of Electrical and Computer Engineering, Binghamton, New York

Miroslav Goljan

SUNY Binghamton, Department of Electrical Engineering, Binghamton, New York

Nasir Memon

Polytechnic University, Department of Computer Science, Brooklyn, New York?11201 E-mail: memon@poly.edu

J. Electron. Imaging. 11(2), 262-274 (Apr 01, 2002). doi:10.1117/1.1459449
History: Received June 5, 2000; Revised June 5, 2001; Accepted Sep. 19, 2001; Online April 12, 2002
Text Size: A A A

The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digital watermarks have been proposed in the literature. In this paper we examine the security of the Yeung–Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered authentic. We present two attacks. The first attack infers the secret watermark insertion function. This enables an attacker to embed a valid watermark in any image. The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function) and contain the same watermark. We show simulation results in which the watermark and the watermark insertion function can be mostly reconstructed in a few (1–5) minutes of computation, using as few as two images. The second attack we present, which we call the “collage attack” is a variation of the Holliman–Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a sophisticated dithering process. © 2002 SPIE and IS&T.

© 2002 SPIE and IS&T

Citation

Jessica Fridrich ; Miroslav Goljan and Nasir Memon
"Cryptanalysis of the Yeung–Mintzer fragile watermarking technique", J. Electron. Imaging. 11(2), 262-274 (Apr 01, 2002). ; http://dx.doi.org/10.1117/1.1459449


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

PubMed Articles
Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.