Research Article
On the Analysis and Design of Secure Multimedia Authentication Scheme
@INPROCEEDINGS{10.1109/CHINACOM.2008.4685264, author={Jinwei Wang and Shiguo Lian and Guangjie Liu}, title={On the Analysis and Design of Secure Multimedia Authentication Scheme}, proceedings={1st International ICST Workshop on Multimedia Security in Communication}, publisher={IEEE}, proceedings_a={MUSIC}, year={2008}, month={11}, keywords={authentication set security analysis watermarking}, doi={10.1109/CHINACOM.2008.4685264} }
- Jinwei Wang
Shiguo Lian
Guangjie Liu
Year: 2008
On the Analysis and Design of Secure Multimedia Authentication Scheme
MUSIC
IEEE
DOI: 10.1109/CHINACOM.2008.4685264
Abstract
In this paper, a novel concept "authentication set" is used to analyze the security of the authentication shcemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set". According to the relation among the authentication sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle