Tamper Detection in RFID Tags Using Zero-watermarks

被引:0
|
作者
Yao, Xiaoming [1 ]
Chen, Hongyu [1 ]
Li, Honglei [1 ]
Zhou, Xiaoyi [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
来源
关键词
RFID Security; Tamper Detection; Zero-watermark; RFID Tags;
D O I
10.4028/www.scientific.net/AMM.511-512.169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently data integrity issues of applications based on radio frequency identification (RFID) have drawn great concerns worldwide and many watermarking-based schemes have been proposed. While those schemes can effectively verify if the protected tag data be modified, they also expose both the protected data and the watermark to any adversaries. In this paper, we present a zero-watermark scheme, which stores the watermark not in part of the data fields of RFID tags but in the back-end database system or that of a trusted third party without any modification of the original RFID data. The novelty of this zero-watermark scheme lies in the fact that we extend the zero-watermark technology to the RFID tags and the use of data tampering from the limited applications of copyright protection of digital works. We term this scheme ZMark-TamDetect because it is a tamper detection solution using zero-watermarks, which is so designed that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates zero-watermark and RFID technologies together and it provides a detailed theoretical foundation for the ZMark-TamDetect.
引用
收藏
页码:169 / 172
页数:4
相关论文
共 50 条
  • [1] Tamper detection in RFID tags using fragile watermarking
    Potdar, Vidyasagar
    Chang, Elizabeth
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, 2006, : 3026 - +
  • [2] Tamper Discrimination in RFID Tags Using Chaotic Fragile Watermark
    Fan, Ming-Quan
    Wang, Hong-Xia
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 147 - 150
  • [3] IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS
    Qi, Xiaojun
    Xin, Xing
    Chang, Ran
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4257 - 4260
  • [4] An Image Tamper Detection and Recovery Method Using Multiple Watermarks
    Pongsomboon, Paween
    Kondo, Toshiaki
    Kamakura, Yoshiyuki
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2016,
  • [5] A new algorithm for the generation of a type of zero-watermarks which are robust to geometrical attacks
    Duanmu, Chunjiang
    Zhang, Weidong
    [J]. International Journal of Digital Content Technology and its Applications, 2012, 6 (15) : 388 - 397
  • [6] Towards tamper detection and classification with robust watermarks
    Knowles, H
    Winne, D
    Canagarajah, N
    Bull, D
    [J]. PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II: COMMUNICATIONS-MULTIMEDIA SYSTEMS & APPLICATIONS, 2003, : 959 - 962
  • [7] Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks
    Zhou, Wujie
    Jiang, Gangyi
    Yu, Mei
    Shao, Feng
    Peng, Zongju
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (01) : 167 - 176
  • [8] Detection of Fracture in Structural Adhesive Using RFID Tags
    Ohashi, Nariaki
    Shiraiwa, Takayuki
    Enoki, Manabu
    [J]. MATERIALS TRANSACTIONS, 2014, 55 (11) : 1722 - 1726
  • [9] Malevolent Object Detection Using Microwave RFID Tags
    Morys, Marcin M.
    Akbar, Muhammad B.
    Durgin, Gregory D.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 50 - 57
  • [10] Fragile Watermarking for Tamper Detection in RFID Tag using Arnold Transform
    Patil, Kishor T.
    Patil, Deepali K.
    Narayankhedkar, Santosh K.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,