Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001

We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be w...

Full description

Bibliographic Details
Main Authors: Ling, Huo-Chong, Heng, Swee-Huay, Phan, Raphael C.-W.
Format: Conference or Workshop Item
Published: 2007
Subjects:
Online Access:http://shdl.mmu.edu.my/3193/
_version_ 1848790259771375616
author Ling, Huo-Chong
Heng, Swee-Huay
Phan, Raphael C.-W.
author_facet Ling, Huo-Chong
Heng, Swee-Huay
Phan, Raphael C.-W.
author_sort Ling, Huo-Chong
building MMU Institutional Repository
collection Online Access
description We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here
first_indexed 2025-11-14T18:09:47Z
format Conference or Workshop Item
id mmu-3193
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:09:47Z
publishDate 2007
recordtype eprints
repository_type Digital Repository
spelling mmu-31932011-10-06T01:31:40Z http://shdl.mmu.edu.my/3193/ Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001 Ling, Huo-Chong Heng, Swee-Huay Phan, Raphael C.-W. T Technology (General) QA75.5-76.95 Electronic computers. Computer science We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here 2007-02 Conference or Workshop Item NonPeerReviewed Ling, Huo-Chong and Heng, Swee-Huay and Phan, Raphael C.-W. (2007) Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), FEB 12-14, 2007, Phoenix Pk, SOUTH KOREA. http://dx.doi.org/10.1109/ICACT.2007.358750 doi:10.1109/ICACT.2007.358750 doi:10.1109/ICACT.2007.358750
spellingShingle T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
Ling, Huo-Chong
Heng, Swee-Huay
Phan, Raphael C.-W.
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title_full Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title_fullStr Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title_full_unstemmed Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title_short Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
title_sort attacks on a blind signature-based steganographic protocol of ieee-wisp 2001
topic T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/3193/
http://shdl.mmu.edu.my/3193/
http://shdl.mmu.edu.my/3193/