Nothing Special   »   [go: up one dir, main page]

Skip to main content

Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

  • 2482 Accesses

Abstract

Recently, the technique of semi-automated protocol verification using model-checkers was transferred from cryptography to the domain of watermark-based communication protocols. This technique offers cost-effective security verification of such watermark-based protocols and an increased flexibility in comparison to traditionally applied, manual mathematical proofs. In this paper, we want to evaluate the feasibility of this approach, using the modeling language CASPER and the model-checker FDR. We extract the prospects and limitations of the approach by modeling and verifying a practical application scenario for forensic investigations using high-resolution biometric fingerprint data. We evaluate the security aspects, which can be verified by the scheme, as well as the syntactical limitations, complexity limitations and the methodological limitations and indentify necessary improvements for a practical usage of such scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Pimentel, J.C.L., Monroy, R.: Formal Support to Security Protocol Devel-opment: A Survey. Computación y Sistemas 12(1), 89–108 (2008) ISSN 1405-5546

    Google Scholar 

  2. Kraetzer, C., Merkel, R., Altschaffel, R., Clausing, E., Schott, M., Dittmann, J.: Modelling Watermark Communication Protocols using the CASPER Modelling Language. In: Proc. ACM Multimedia and Security Workshop 2010 (MMSec 2010), Rome, Italy, pp. S.67–S.72. ACM Press, New York (2010) ISBN 978-1-450-30286-9

    Google Scholar 

  3. Lowe, G.: CASPER: A Compiler for the Analysis of Security Protocols. Journal of Computer Security (1998)

    Google Scholar 

  4. FDR user manual. Formal Systems (Europe) Ltd., http://www.fsel.com/documen-tation/fdr2/html/ (last accessed August 30, 2011)

  5. Lowe, G., Broadfoot, P., Dilloway, C., Hui, M.L.: CASPER - A Compiler for the Analysis of Security Protocols. User Manual and Tutorial, Version 1.12, Oxford University Computing Lab (2009)

    Google Scholar 

  6. Roscoe, A.W.: Model-checking CSP. In: A Classical Mind: Essays in Honour of C. A. R. Hoare. Prentice Hall International (UK) Ltd. (1994)

    Google Scholar 

  7. Viganò, L.: Automated Security Protocol Analysis with the AVISPA Tool. In: Proc. XXI Mathematical Foundations of Programming Semantics, MFPS 2005 (2005)

    Google Scholar 

  8. Reactive Objects Language, http://ece.ut.ac.ir/FML/rebeca.htm (last accessed August 30, 2011)

  9. Song, D.X.: Athena: a new efficient automatic checker for security protocol analysis. In: Proceedings of the Twelfth IEEE Computer Security Foundations Workshop, pp. 192–202. IEEE Computer Society Press (1999)

    Google Scholar 

  10. Fries Research Technology, http://www.frt-gmbh.com/en/ (last accessed August 30, 2011)

  11. Newman, R.: Computer forensics: evidence, collection, and management. Auerbach (2007)

    Google Scholar 

  12. Sheppard, N.P., Naini, R.S., Ogunbona, P.: On multiple watermarking. In: Proc. ACM Multimedia and Security Workshop 2001 Ottawa, Ontario, Canada, October 5, pp. 3–6. ACM (2001)

    Google Scholar 

  13. Dittmann, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Provably secure authentication of digital media through invertible watermarks. Cryptology ePrint Archive, Report 2004/293 (2004), http://eprint.iacr.org/

  14. Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. IEEE Signal Process. Lett. 14(4), 255–258 (2007)

    Article  Google Scholar 

  15. Hui, M.L., Lowe, G.: Safe simplifying transformations for security protocols. In: 12th Computer Security Foundations Workshop Proceedings, pp. 32–43. IEEE Computer Society Press (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Merkel, R., Kraetzer, C., Altschaffel, R., Clausing, E., Schott, M., Dittmann, J. (2012). Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics