1st International ICST Workshop on Multimedia Security in Communication

Research Article

On the Analysis and Design of Secure Multimedia Authentication Scheme

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685264,
        author={Jinwei Wang and Shiguo Lian and Guangjie Liu},
        title={On the Analysis and Design of Secure Multimedia Authentication Scheme},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        publisher={IEEE},
        proceedings_a={MUSIC},
        year={2008},
        month={11},
        keywords={authentication set security analysis watermarking},
        doi={10.1109/CHINACOM.2008.4685264}
    }
    
  • Jinwei Wang
    Shiguo Lian
    Guangjie Liu
    Year: 2008
    On the Analysis and Design of Secure Multimedia Authentication Scheme
    MUSIC
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685264
Jinwei Wang1,*, Shiguo Lian2, Guangjie Liu3
  • 1: the 28th Research Institute, CETC Nanjing 210007, P. R. China
  • 2: France Telecom R&D Beijing Beijing 100080
  • 3: Nanjing University of Sci. & Tech. Nanjing 210094
*Contact email: wjwei_2004@163.com

Abstract

In this paper, a novel concept "authentication set" is used to analyze the security of the authentication shcemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set". According to the relation among the authentication sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle