Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition

被引:0
作者
El Maadi A. [1 ]
Loukhaoukha K. [2 ,3 ]
Benmami M. [2 ]
Zebbiche K. [3 ]
Mehallegue N. [2 ]
机构
[1] École Militaire Polytechnique, Algiers
[2] Development Research Center, Algiers
[3] École Supérieure de la Gendarmerie Nationale, Zéralda
关键词
Ambiguity attack; Discrete wavelet transform; Image watermarking; Singular value decomposition;
D O I
10.1007/s11042-024-18980-9
中图分类号
学科分类号
摘要
In this paper, we present two ambiguity attacks on a watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD). These attacks result in the extracted watermark differing from the embedded watermark. In the first attack, an attacker can extract their watermark from any watermarked image using this algorithm. However, in the second attack, when the watermarked image is rewatermarked by the attacker’s watermark, the extracted watermark will be visually similar to the attacker’s watermark. Consequently, this algorithm is insecure and cannot be used for ownership verification and copyright protection. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:5335 / 5348
页数:13
相关论文
共 30 条
[1]  
Kundu N., Debnath S., Choudhury T., Post-quantum digital signature scheme based on multivariate cubic problem, J Inf Sec Appl, 53, (2020)
[2]  
Loukhaoukha K., Chouinard J.-Y., A new image watermarking algorithm based on wavelet transform, Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 229-234, (2009)
[3]  
Najafi E., Loukhaoukha K., Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform, J Inf Sec Appl, 44, pp. 144-156, (2019)
[4]  
Park Y., Kang H., Yamaguchi K., Kobayashi K., Watermarking for tamper detection and recovery, IEICE Electron Express, 5, 17, pp. 689-696, (2008)
[5]  
Zeki A.M., Manaf A.A., A novel digital watermarking technique based on ISB (Intermediate Significant Bit), Proc World Acad Sci Eng Technol, 38, pp. 1080-1087, (2009)
[6]  
Nguyen T.T., Tuan H.D., A Modified Spatial Spread Spectrum Method for Digital Image Watermarking, International Conference on Communications and Electronics, pp. 282-287, (2008)
[7]  
Loukhaoukha K., Chouinard J.-Y., On the security of ownership watermarking of digital images based on SVD decomposition, J Electron Imaging, pp. 19-pp, (2010)
[8]  
Pai Y.-T., Ruan S.-J., A high quality robust digital watermarking by smart distribution technique and effective embedded scheme, IEICE Trans Fundam Electron Commun Comput Sci, E90A, pp. 597-605, (2007)
[9]  
Tao L., Kwan H.K., Novel DCT-based real-valued discrete Gabor transform and its fast algorithms, IEEE Trans Signal Process, 57, pp. 2151-2164, (2009)
[10]  
Liu R., Tan T., A SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans Multimed, 4, pp. 121-128, (2002)