Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001

Citation

Ling, Huo-Chong and Heng, Swee-Huay and Phan, Raphael C.-W. (2007) Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), FEB 12-14, 2007, Phoenix Pk, SOUTH KOREA.

Full text not available from this repository.

Abstract

We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here

Item Type: Conference or Workshop Item (Paper)
Subjects: T Technology > T Technology (General)
Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Engineering and Technology (FET)
Depositing User: Ms Suzilawati Abu Samah
Date Deposited: 06 Oct 2011 01:31
Last Modified: 06 Oct 2011 01:31
URII: http://shdl.mmu.edu.my/id/eprint/3193

Downloads

Downloads per month over past year

View ItemEdit (login required)