On the security of the digest function in the SARI image authentication system

被引:16
|
作者
Radhakrishnan, R [1 ]
Memon, N
机构
[1] Polytech Univ, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Polytech Univ, Dept Comp Sci, Brooklyn, NY 11201 USA
基金
美国国家科学基金会;
关键词
image authentication; image digest functions; salt; SARI;
D O I
10.1109/TCSVT.2002.805505
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the image authentication system SARI, proposed by Lin and Chang, that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he can cause arbitrary images to be authenticated with this same but unknown key. We show that the number of such images needed by Oscar to launch a successful attack is quite small, making the attack very practical. We then suggest possible solutions to enhance the security of this authentication system.
引用
收藏
页码:1030 / 1033
页数:4
相关论文
共 50 条
  • [31] Localization and security enhancement of block-based image authentication
    Ouda, AH
    El-Sakka, MR
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 789 - 792
  • [32] Security protection using two different image shadows with authentication
    Liu, Yanjun
    Chang, Chin-Chen
    Huang, Peng-Cheng
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (04) : 1914 - 1932
  • [33] On the security of a BTC-based-compression image authentication scheme
    Tzung-Her Chen
    Tzu-Ching Chang
    Multimedia Tools and Applications, 2018, 77 : 12979 - 12989
  • [34] On the security of a BTC-based-compression image authentication scheme
    Chen, Tzung-Her
    Chang, Tzu-Ching
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) : 12979 - 12989
  • [35] Web Authentication Security Using Image Steganography and AES Encryption
    Mogale, Hope
    Esiefarienrhe, Michael
    Letlonkane, Lucia
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 531 - 537
  • [36] Implementation of Image Based Authentication to Ensure the Security of Mail Server
    Rahim, Abdul M.
    Anandhavalli, D.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 555 - 558
  • [37] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [38] HTTP digest authentication in embedded automation systems
    von Hoff, TP
    Crevatin, M
    ETFA 2003: IEEE CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PROCEEDINGS, 2003, : 390 - 397
  • [39] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [40] An IFF Identity Authentication Scheme of Security and Guarantee System
    Deng, Jie
    Ren, Yongjin
    Li, Yunji
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1529 - 1532