Tampering with a watermarking-based image authentication scheme

被引:28
|
作者
Phan, Raphael C. -W. [1 ]
机构
[1] Univ Loughborough, Loughborough LE11 3TU, Leics, England
关键词
encoding; watermarking; information hiding; digital rights management; image authentication; tampering; ownership;
D O I
10.1016/j.patcog.2008.05.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3493 / 3496
页数:4
相关论文
共 50 条
  • [1] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [2] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [3] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [4] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [5] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [6] Fragile Watermarking-based Authentication Scheme for Demosaicked Images
    Lin, Chia-Chen
    Liu, Xiao-Long
    Lin, Cheng-Han
    Yuan, Shyan-Ming
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 97 - 100
  • [7] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [8] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [9] A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization
    Coatrieux, Gouenou
    Huang, Hui
    Shu, Huazhong
    Luo, Limin
    Roux, Christian
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2013, 17 (06) : 1057 - 1067
  • [10] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057