Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme

被引:11
作者
Benrhouma, Oussama [1 ]
Hermassi, Houcemeddine [1 ]
Belghith, Safya [1 ]
机构
[1] Univ Tunis ElManar, Ecole Natl Ingenieurs Tunis, RISC Lab, Bnikhiar, Tunisia
关键词
SVD; Tamper localization; Self-recovery; Attack; Improvement; Watermarking; FRAGILE WATERMARKING; RESTORATION CAPABILITY; AUTHENTICATION; CRYPTANALYSIS; PROTECTION;
D O I
10.1007/s11042-016-4054-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyses the security of an effective SVD-based image tampering detection and self-recovery scheme that has been recently proposed by S. Dadkhah et al. Some errors in the embedding/extraction processes are underlined and an attack against this scheme is demonstrated. The theoretical and experimental results show that the proposed scheme is not secure. Finally, an improvement of the scheme is proposed to enhance its security.
引用
收藏
页码:21133 / 21156
页数:24
相关论文
共 23 条
[1]  
[Anonymous], 1883, J SCI MILITAIRES
[2]  
Arnold V, 1968, ERGODIC PROBLEMS CLA, P564
[3]   Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms [J].
Aslantas, Veysel ;
Ozer, Saban ;
Ozturk, Serkan .
OPTICS COMMUNICATIONS, 2009, 282 (14) :2806-2817
[4]   Period of the discrete Arnold cat map and general cat map [J].
Bao, Jianghong ;
Yang, Qigui .
NONLINEAR DYNAMICS, 2012, 70 (02) :1365-1375
[5]  
Benrhouma O, 2015, MULTIMED TOOLS APPL, P1
[6]   Tamper detection and self-recovery scheme by DWT watermarking [J].
Benrhouma, Oussama ;
Hermassi, Houcemeddine ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2015, 79 (03) :1817-1833
[7]   A new robust reference logo watermarking scheme [J].
Bhatnagar, Gaurav ;
Raman, Balasubramanian .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :621-640
[8]   A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection [J].
Botta, Marco ;
Cavagnino, Davide ;
Pomponiu, Victor .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) :242-245
[9]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[10]   An effective SVD-based image tampering detection and self-recovery using active watermarking [J].
Dadkhah, Sajjad ;
Abd Manaf, Azizah ;
Hori, Yoshiaki ;
Hassanien, Aboul Ella ;
Sadeghi, Somayeh .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (10) :1197-1210