On the Design of Secure Multimedia Authentication

被引:0
|
作者
Wang, Jinwei [1 ]
Lue, Jianmin [1 ]
Lian, Shiguo [2 ]
Liu, Guangjie [3 ]
机构
[1] CETC, Res Inst 28, Nanjing, Peoples R China
[2] France Telecom R&D Beijing, Beijing, Peoples R China
[3] Nanjing Univ Sci & Tech, Nanjing, Peoples R China
关键词
content-based; watermarking; authentication; authentication set; design principle; IMAGE AUTHENTICATION; FRAGILE WATERMARKING;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The third category is the content-based watermarking authentication schemes in which the watermark is generated by the multimedia content. However, there exists the security question in the above-mentioned three categories of the authentication schemes. In this paper, a novel concept that is called "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set". According to the relation among the aforementioned sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.
引用
收藏
页码:426 / 443
页数:18
相关论文
共 50 条
  • [1] On the Analysis and Design of Secure Multimedia Authentication Scheme
    Wang, Jinwei
    Lian, Shiguo
    Liu, Guangjie
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1233 - +
  • [2] Secure multimedia watermarking authentication in wavelet domain
    Wang, Jinwei
    Lian, Shiguo
    Liu, Guangjie
    Dai, Yuewei
    Liu, Zhongxuan
    Ren, Zhen
    JOURNAL OF ELECTRONIC IMAGING, 2008, 17 (03)
  • [3] A class of authentication digital watermarks for secure multimedia communication
    Xie, LH
    Arce, GR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (11) : 1754 - 1764
  • [4] Efficient and provably secure IP multimedia subsystem authentication for UMTS
    Huang, Chung-Ming
    Li, Jian-Wei
    COMPUTER JOURNAL, 2007, 50 (06): : 739 - 757
  • [5] A Secure and Efficient IP Multimedia Subsystem Authentication Mechanism for LTE
    Ashraf, Humaira
    Sher, Muhammad
    Ghafoor, Ata Ullah
    Imran, Muhammad
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04): : 839 - 848
  • [6] A secure smart card authentication and authorization framework using in multimedia cloud
    Yang, Ta-Chih
    Lo, Nai-Wei
    Liaw, Horng-Twu
    Wu, Wei Chen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (09) : 11715 - 11737
  • [7] A secure smart card authentication and authorization framework using in multimedia cloud
    Ta-Chih Yang
    Nai-Wei Lo
    Horng-Twu Liaw
    Wei Chen Wu
    Multimedia Tools and Applications, 2017, 76 : 11715 - 11737
  • [8] Design of Secure Authentication Handover Protocol for Innovative Mobile Multimedia Services in 5G MEC Environments
    Kim, Jiyoon
    Han, Dong-Guk
    You, Ilsun
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1245 - 1261
  • [9] Incremental Design of Secure Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 3196 - 3201
  • [10] Design of an UHF RFID Transponder for Secure Authentication
    Bernardi, P.
    Gandino, F.
    Montrucchio, B.
    Rebaudengo, M.
    Sanchez, E. R.
    GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 2007, : 387 - 392