On the security of the SARI image authentication system

R. Radhakrishnan, N. Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he can cause arbitrary images to be authenticated with this same but unknown key. We show that the number of such images needed by Oscar to launch a successful attack is quite small, making the attack very practical. We then suggest possible solutions to enhance the security of this authentication system.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Image Processing
Pages971-974
Number of pages4
Volume3
StatePublished - 2001
EventIEEE International Conference on Image Processing (ICIP) - Thessaloniki, Greece
Duration: Oct 7 2001Oct 10 2001

Other

OtherIEEE International Conference on Image Processing (ICIP)
Country/TerritoryGreece
CityThessaloniki
Period10/7/0110/10/01

ASJC Scopus subject areas

  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'On the security of the SARI image authentication system'. Together they form a unique fingerprint.

Cite this