Security of invertible media authentication schemes revisited

D. Dönigus, S. Endler, M. Fischlin, A.T. Hülsing, P. Jäger, A. Lehmann, S. Podrazhansky, S. Schipp, E. Tews, S. Vowe, M. Walthart, F. Weidemann

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

Dittmann, Katzenbeisser, Schallhart and Veith (SEC 2005) introduced the notion of invertible media authentication schemes, embedding authentication data in media objects via invertible watermarks. These invertible watermarks allow to recover the original media object (given a secret encryption key), as required for example in some medical applications where the distortion must be removable. Here we revisit the approach of Dittmann et al. from a cryptographic viewpoint, clarifying some important aspects of their security definitions. Namely, we first discuss that their notion of unforgeability may not suffice in all settings, and we therefore propose a strictly stronger notion. We then show that the basic scheme suggested by Dittmann et al. achieves our notion if instantiated with the right cryptographic primitives. Our proof also repairs a flaw in the original scheme, pointed out by Hopper, Molnar and Wagner (TCC 2007). We finally address the issue of secrecy of media authentication schemes, basically preventing unauthorized recovering of the original media object without the encryption key. We give a rigorous security statement (that is, the best security guarantee we can achieve) and prove again that the scheme by Dittmann et al. meets this security level if the right cryptographic building blocks are deployed. Together our notions of unforgeability and of secrecy therefore give very strong security guarantees for such media authentication schemes.

Original languageEnglish
Title of host publicationInformation Hiding
Subtitle of host publication9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
EditorsTeddy Furon, François Cayre, Gwenaël Doërr, Patrick Bas
Place of PublicationBerlin
PublisherSpringer
Chapter13
Pages189-203
Number of pages15
ISBN (Electronic)978-3-540-77370-2
ISBN (Print)3-540-77369-X, 978-3-540-77369-6
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event9th International Workshop on Information Hiding (IH 2007) - Saint Malo, France
Duration: 11 Jun 200713 Jun 2007
Conference number: 9

Publication series

NameLecture Notes in Computer Science (LNCS)
Volume4567
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Workshop on Information Hiding (IH 2007)
Abbreviated titleIH 2007
CountryFrance
CitySaint Malo
Period11/06/0713/06/07

Fingerprint Dive into the research topics of 'Security of invertible media authentication schemes revisited'. Together they form a unique fingerprint.

Cite this