Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images

被引:5
作者
Mehallegue, Noureddine [1 ,2 ]
Loukhaoukha, Khaled [1 ,3 ]
Zebbiche, Khalil [1 ,2 ]
Refaey, Ahmed [4 ]
Djellab, Mourad [5 ]
机构
[1] Dev Res Ctr, Algiers, Algeria
[2] Queens Univ, Sch Elect Elect Engn & Comp Sci, Belfast, Antrim, North Ireland
[3] Laval Univ, Dept Elect & Comp Engn, Quebec City, PQ, Canada
[4] Manhattan Coll, Elect & Comp Engn Dept, Riverdale, NY USA
[5] Inst Natl Criminalist & Criminol INCC GN, Algiers, Algeria
关键词
Audio watermarking; Singular value decomposition; Ambiguity attack; False positive detection; SINGULAR-VALUE DECOMPOSITION; WAVELET TRANSFORM; SECURITY ANALYSES; SCHEME;
D O I
10.1007/s11042-019-08271-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the robustness of the proposed watermarking algorithm by Al-Nuaimy et al. (Digit Signal Process 21(6):764-779 2011) for audio signals which is based on singular value decomposition (SVD). It has been concluded that it is fundamentally flawed in its design, in that it falls to two ambiguity attacks where the extracted watermark is not the embedded one but determined by the reference watermark. In the first attack, when a watermarked audio signal is rewatermarked by an attacker's watermark, this one can be easily extracted to claim ownership of the original audio signal. In the second attack, during the extracting process when an attacker uses the singular vectors of his watermark, he can extract the attacker's watermark. Therefore, he can claim ownership of the watermarked audio signal. The experimental results prove that the proposed attacks create a false positive detection in watermark extraction. Therefore, Al-Nuaimy et al. algorithm cannot be used for security systems, data hiding and copyright protection.
引用
收藏
页码:2031 / 2045
页数:15
相关论文
共 41 条
  • [1] Homomorphic image watermarking with a singular value decomposition algorithm
    Abdallah, Hanaa A.
    Ghazy, Rania A.
    Kasban, Hany
    Faragallah, Osama S.
    Shaalan, Abdalhameed A.
    Hadhoud, Mohiy M.
    Dessouky, Moawad I.
    El-Fishawy, Nawal A.
    Alshebeili, Saleh A.
    Abd El-samie, Fathi E.
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2014, 50 (06) : 909 - 923
  • [2] An SVD audio watermarking approach using chaotic encrypted images
    Al-Nuaimy, Waleed
    El-Bendary, Mohsen A. M.
    Shafik, Amira
    Shawki, Farid
    Abou-El-azm, A. E.
    El-Fishawy, N. A.
    Elhalafawy, Said M.
    Diab, Salaheldin M.
    Sallam, Bassiouny M.
    Abd El-Samie, Fathi E.
    Kazemian, H. B.
    [J]. DIGITAL SIGNAL PROCESSING, 2011, 21 (06) : 764 - 779
  • [3] Comments on "Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm"
    Ali, Musrrat
    Ahn, Chang Wook
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) : 2392 - 2394
  • [4] Robust audio watermarking algorithm based on DWT using Fibonacci numbers
    Attari, Ali Akbar
    Shirazi, Ali Asghar Beheshti
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25607 - 25627
  • [5] A new DCT audio watermarking scheme based on preliminary MP3 study
    Charfeddine, Maha
    El'arbi, Maher
    Ben Amar, Chokri
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1521 - 1557
  • [6] A robust color image watermarking with Singular Value Decomposition method
    Dogan, Sengul
    Tuncer, Turker
    Avci, Engin
    Gulten, Arif
    [J]. ADVANCES IN ENGINEERING SOFTWARE, 2011, 42 (06) : 336 - 346
  • [7] Efficient SVD speech watermarking with encrypted images
    El-Gazar S.
    Abbas A.M.
    El-Dolil S.
    El-Dokany I.M.
    Dessouky M.I.
    El-Rabaie E.-S.M.
    Abd El-Samie F.E.
    [J]. International Journal of Speech Technology, 2018, 21 (4) : 953 - 965
  • [8] Fallahpour M, 2012, INT J INNOV COMPUT I, V8, P2477
  • [9] A zero-bit Fourier image watermarking for print-cam process
    Gourrame, Khadija
    Douzi, Hassan
    Harba, Rachid
    Riad, Rabia
    Ros, Frederic
    Amar, Meina
    Elhajji, Mohamed
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 2621 - 2638
  • [10] Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition
    Guo, Jing-Ming
    Prasetyo, Heri
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (09) : 816 - 834