Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be w...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3193/ |
| _version_ | 1848790259771375616 |
|---|---|
| author | Ling, Huo-Chong Heng, Swee-Huay Phan, Raphael C.-W. |
| author_facet | Ling, Huo-Chong Heng, Swee-Huay Phan, Raphael C.-W. |
| author_sort | Ling, Huo-Chong |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here |
| first_indexed | 2025-11-14T18:09:47Z |
| format | Conference or Workshop Item |
| id | mmu-3193 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:09:47Z |
| publishDate | 2007 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-31932011-10-06T01:31:40Z http://shdl.mmu.edu.my/3193/ Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 Ling, Huo-Chong Heng, Swee-Huay Phan, Raphael C.-W. T Technology (General) QA75.5-76.95 Electronic computers. Computer science We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here 2007-02 Conference or Workshop Item NonPeerReviewed Ling, Huo-Chong and Heng, Swee-Huay and Phan, Raphael C.-W. (2007) Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), FEB 12-14, 2007, Phoenix Pk, SOUTH KOREA. http://dx.doi.org/10.1109/ICACT.2007.358750 doi:10.1109/ICACT.2007.358750 doi:10.1109/ICACT.2007.358750 |
| spellingShingle | T Technology (General) QA75.5-76.95 Electronic computers. Computer science Ling, Huo-Chong Heng, Swee-Huay Phan, Raphael C.-W. Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title | Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title_full | Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title_fullStr | Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title_full_unstemmed | Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title_short | Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 |
| title_sort | attacks on a blind signature-based steganographic protocol of ieee-wisp 2001 |
| topic | T Technology (General) QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/3193/ http://shdl.mmu.edu.my/3193/ http://shdl.mmu.edu.my/3193/ |