Tampering with a watermarking-based image authentication scheme

被引:28
作者
Phan, Raphael C. -W. [1 ]
机构
[1] Univ Loughborough, Loughborough LE11 3TU, Leics, England
关键词
encoding; watermarking; information hiding; digital rights management; image authentication; tampering; ownership;
D O I
10.1016/j.patcog.2008.05.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3493 / 3496
页数:4
相关论文
共 25 条
[1]  
BARRETO PSL, 2006, SIGNAL PROCESS, V27, P439
[2]   Joint near-lossless compression and watermarking of still images for authentication and tamper localization [J].
Caldelli, Roberto ;
Filippini, Francesco ;
Barni, Mauro .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2006, 21 (10) :890-903
[3]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[4]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[5]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[6]   A data-hiding technique with authentication, integration, and confidentiality for electronic patient records [J].
Chao, HM ;
Hsu, CM ;
Miaou, SG .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01) :46-53
[7]   A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection [J].
Chen, WY ;
Chen, CH .
PATTERN RECOGNITION, 2005, 38 (04) :587-598
[8]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[9]   Speaker identification security improvement by means of speech watermarking [J].
Faundez-Zanuy, Marcos ;
Hagmueller, Martin ;
Kubin, Gernot .
PATTERN RECOGNITION, 2007, 40 (11) :3027-3034
[10]   Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform [J].
Feng, GR ;
Jiang, LG ;
Wang, DJ ;
He, C .
PATTERN RECOGNITION, 2005, 38 (12) :2530-2536