Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication

Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication

Jia-Hong Li (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan), Tzung-Her Chen (Department of Computer Science and Information Engineering, National Chiayi University, Chia-Yi City, Taiwan) and Wei-Bin Lee (Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan)
Copyright: © 2014 |Pages: 17
DOI: 10.4018/ijdcf.2014070103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.
Article Preview

Review Of Chang Et Al.’S Scheme

To understand the “Tattooing Attack”, we take Chang et al.’s scheme (Chang, 2006) as an example, although a security problem (Phan, 2008) has been found recently. We will later show that the attack can be generalized to other image authentication schemes.

In 2006, Chang et al. (2006) proposed an image authentication scheme for grayscale images based on the fragile watermarking technique, which can assure the ownership of the image as well as detect the counterfeited part of the image. Figure 1 demonstrates the processes of Chang et al.’s scheme.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing