Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
نویسندگان
چکیده
Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random watermarks is proposed in order to combat invertibility attacks. The described technique can be used in conjunction with any watermarking algorithm, no matter it is kept secret or made public, without resorting to a third party jury as required by some previous approaches. By introducing a set of reference sequences, segmentation of the digital information and iterative computation of watermarks, the protocol is further enhanced so that it can resist more sophisticated types of attack based on forging an illegitimate detector.
منابع مشابه
Invertibility attack against watermarking based on forged algorithm and a countermeasure
It is shown in this paper that, even with a non-invertible watermarking algorithm or an asymmetric watermarking protocol, it is still possible to effect an invertibility attack, which relies on a forged watermarking algorithm, a counterfeit mark, and a fake key. Two examples are given to show the vulnerability of the unfortified non-invertible algorithm/ asymmetric protocol. As a solution, a se...
متن کاملA note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملWatermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several piece...
متن کاملRobust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack
Digital watermarking provides a feasible way for copyright protection of multimedia. The major disadvantage of the existing methods is their poor resistance to both extensive geometric distortions and watermark-estimation attack (WEA). In view of this fact, our goal of this paper is to propose a robust image watermarking scheme that can withstand geometric distortions and WEA. Our scheme is mai...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کامل