Top Banner
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1 , Bin B. Zhu 2 , Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent Technology and Sy stems, Beijing 2 Microsoft Research Asia, Beijing Reporter: YH Chung
12

New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Dec 17, 2015

Download

Documents

Amie Palmer
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

New Attacks on Sari Image Authentication

System

Proceeding of SPIE

2004

Jinhai Wu1, Bin B. Zhu2, Shipeng Li, Fuzong Lin1State key Lab of Intelligent Technology and Systems, Beijing

2Microsoft Research Asia, Beijing

Reporter: YH Chung

Page 2: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Outline

Introduction Sari System Histogram attack Oracle attack Conclusions

Page 3: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Introduction

Image processing tools and widely available powerful computers have made image manipulations an easy task.

Checking an image’s authenticity becomes more and more important.

Page 4: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Sari System

Sari system means Self-Authentication and Recovery Image system, and it’s a widely studied image authentication schemes.

The SARI system exploits the fact that the same quantization table is applied to all the Discrete Cosine Transform blocks of an image in the JPEG.

Page 5: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Sari System

Check authenticity Parameters:

For the block pair p and q at the DCT frequency bin V.

Count

Measure the tolerance bound t

Page 6: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Sari System

A vulnerability of the SARI system, as the follow scheme:

Page 7: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Histogram attack

When a histogram of DCT coefficients is stretched or shrunken, the relationship between any two DCT coefficients does not change.

Histogram attack steps: Collect all the DCT coefficient at a selected frequency bin

v. Calculate the histogram of these DCT coefficients.

For a JPEG compressed image, the histogram can b e the JPEG quantized integers of the DCT coefficients since any change will be quantized by the same JPEG quantization step.

Page 8: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Histogram attack

The result of histogram attack

It causes the trust problem.

Page 9: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Histogram attack

A fix to histogram attack To add the maximum and minimum DCT

coefficients of each selected frequency bin to the digital signature for an image.

It’s much more difficult to modify the histogram without changing any relationship of DCT coefficients and with the mean values of DCT values close enough to the mean values recorded in the digital signature.

Page 10: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Oracle attack

It is designed to find out the secret mapping function W.

In the SARI system , if two DCT coefficients from two blocks in the same pair at a selected frequency bin are modified by the same amount ,the corresponding feature bit does not change.

Two stage of oracle attack: Find the first pair of blocks Find the remaining pairs

Use the pair that previously found to ensure the sum of DCT values.

Page 11: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Oracle attack

Solution to fight oracle attack Making each pair has exactly one block in

common with one more pair. Shortcoming is increase the signature size.

Use two independent mapping functions W1 and W2 to generate two sets of the feature codes of the same size.

Page 12: New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.

Conclusions

This paper proposed two new attacks to the SARI system.

The first is the histogram attack which modifies DCT coefficients.

The second is the oracle attack which uses and oracle to find the secret pairs used by SARI in generating the digital signature for an image.