Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Counterfeiting Attack on a Lossless Authentication Watermarking Scheme

Wu, Y., Xu, C. and Bao, F.

    This paper describes an effective attack on a lossless authentication watermarking scheme [Fridrich et. al 2001]. Given sufficient number of pairs of stego-images and its coverimages, an attacker can obtain the data (e.g., random walk sequence, lookup table) generated from a secret key. With these data, the attacker can easily forge authentic images. The experiment demonstrates this attack is very efficient to the lossless watermarking scheme. To avoid such attack, we modify the process of lookup table generation so that the table is variable with the content of the cover-image.
Cite as: Wu, Y., Xu, C. and Bao, F. (2003). Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. In Proc. Pan-Sydney Area Workshop on Visual Information Processing (VIP2002), Sydney, Australia. CRPIT, 22. Jin, J. S., Eades, P., Feng, D. D. and Yan, H., Eds. ACS. 109.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007