A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection

被引:15
作者
Botta, Marco [1 ]
Cavagnino, Davide [1 ]
Pomponiu, Victor [2 ]
机构
[1] Univ Turin, Dept Comp Sci, I-10149 Turin, Italy
[2] Singapore Univ Technol & Design, Singapore 138682, Singapore
关键词
Fragile watermarking; Content authentication; Arnold cat map; Logistic map; Security; AUTHENTICATION; SECURITY;
D O I
10.1016/j.aeue.2014.09.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we show that a recently proposed fragile watermarking scheme by Rawat et al. does not detect and localize tampering, therefore cannot be used for authentication applications. The problem lies in that the scheme embeds an authentication code into the LSBs of pixels without taking into consideration the image content. To overcome this issue the authentication should be combined with the first seven bits of the image pixels, and in this paper a revision in this sense is proposed. (C) 2014 Published by Elsevier GmbH.
引用
收藏
页码:242 / 245
页数:4
相关论文
共 13 条
[1]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[2]  
Botta M., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P65, DOI 10.1109/ICNSS.2011.6059961
[3]   Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (04) :728-739
[4]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[5]   Security of fragile authentication watermarks with localization [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :691-700
[6]  
Hassanien AE, 2008, STUD COMPUT INTELL, V96, P3
[7]   Fragile watermarking based on encoding of the zeroes of the z-transform [J].
Ho, Anthony T. S. ;
Zhu, Xunzhan ;
Shen, Jun ;
Marziliano, Pina .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :567-569
[8]  
Li L-J, 2008, PROC IEEE C COMPUT V, P1
[9]   Protecting the Content Integrity of Digital Imagery with Fidelity Preservation [J].
Lin, Pei-Yu ;
Lee, Jung-San ;
Chang, Chin-Chen .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2011, 7 (03)
[10]   A novel image fragile watermarking algorithm based on chaotic map [J].
Liu, Pei-pei ;
Zhu, Zhong-liang ;
Wang, Hong-xia ;
Yan, Tian-yun .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, :631-634