Abstract
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he can cause arbitrary images to be authenticated with this same but unknown key. We show that the number of such images needed by Oscar to launch a successful attack is quite small, making the attack very practical. We then suggest possible solutions to enhance the security of this authentication system.
Original language | English (US) |
---|---|
Title of host publication | IEEE International Conference on Image Processing |
Pages | 971-974 |
Number of pages | 4 |
Volume | 3 |
State | Published - 2001 |
Event | IEEE International Conference on Image Processing (ICIP) - Thessaloniki, Greece Duration: Oct 7 2001 → Oct 10 2001 |
Other
Other | IEEE International Conference on Image Processing (ICIP) |
---|---|
Country/Territory | Greece |
City | Thessaloniki |
Period | 10/7/01 → 10/10/01 |
ASJC Scopus subject areas
- Computer Vision and Pattern Recognition
- Hardware and Architecture
- Electrical and Electronic Engineering