<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-015-02-0426</article-id>
      <article-id pub-id-type="publisher-id">29315</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>H.3.3 - Information Search and Retrieval</subject>
          <subject>H.4.0 - General</subject>
          <subject>H.5.1 - Multimedia Information Systems</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>On the Design of Secure Multimedia Authentication</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Jinwei</given-names>
          </name>
          <email xlink:type="simple">wjwei_2004@163.com</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Lü</surname>
            <given-names>Jianmin</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Lian</surname>
            <given-names>Shiguo</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Guangjie</given-names>
          </name>
          <xref ref-type="aff" rid="A3">3</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">CETC, Nanjing, China</addr-line>
        <institution>CETC</institution>
        <addr-line content-type="city">Nanjing</addr-line>
        <country>China</country>
      </aff>
      <aff id="A2">
        <label>2</label>
        <addr-line content-type="verbatim">France Telecom R&amp;D Beijing, Beijing, China</addr-line>
        <institution>France Telecom R&amp;D Beijing</institution>
        <addr-line content-type="city">Beijing</addr-line>
        <country>China</country>
      </aff>
      <aff id="A3">
        <label>3</label>
        <addr-line content-type="verbatim">Nanjing University of Science and Technology, Nanjing, China</addr-line>
        <institution>Nanjing University of Science and Technology</institution>
        <addr-line content-type="city">Nanjing</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Jinwei Wang (<email xlink:type="simple">wjwei_2004@163.com</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2009</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>01</month>
        <year>2009</year>
      </pub-date>
      <volume>15</volume>
      <issue>2</issue>
      <fpage>426</fpage>
      <lpage>443</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/A0A3FFC7-B09A-5E93-A124-500D505EA437">A0A3FFC7-B09A-5E93-A124-500D505EA437</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/7000645">7000645</uri>
      <permissions>
        <copyright-statement>Jinwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The third category is the content-based watermarking authentication schemes in which the watermark is generated by the multimedia content. However, there exists the security question in the above-mentioned three categories of the authentication schemes. In this paper, a novel concept that is called "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "Cover Authentication Set", "Attack Authentication Set", "Watermark-based Authentication Set" or "Signature-based Authentication Set", "Verified Authentication Set" and "Malicious-attack Authentication Set". According to the relation among the aforementioned sets, the security of the authentication schemes is exploited. Furthermore, a conclusion is drawn according to the analysis result. At the same time the principle that guides the design of the more secure authentication schemes is presented. Finally, as an example, a novel authentication design method based on multi-feature watermarks is proposed according to the design principle. The experimental results prove the validity of the design method and the significance of the guide principle.</p>
      </abstract>
    </article-meta>
  </front>
</article>
