Tampering with a watermarking-based image authentication scheme

被引:28
|
作者
Phan, Raphael C. -W. [1 ]
机构
[1] Univ Loughborough, Loughborough LE11 3TU, Leics, England
关键词
encoding; watermarking; information hiding; digital rights management; image authentication; tampering; ownership;
D O I
10.1016/j.patcog.2008.05.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3493 / 3496
页数:4
相关论文
共 50 条
  • [21] Image authentication scheme research based on fragile watermarking
    School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    [J]. Tien Tzu Hsueh Pao, 2007, 1 (34-39):
  • [22] A Watermarking-based Host Correlation Detection Scheme
    Pan, Zheng
    Peng, Hong
    Long, Xianzhong
    Zhang, Changle
    Wu, Ying
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 493 - 497
  • [23] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [24] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [25] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [26] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [27] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619
  • [28] An image authentication scheme based on digital watermarking and image secret sharing
    Shang-Lin Hsieh
    I-Ju Tsai
    Chung-Ping Yeh
    Chia-Ming Chang
    [J]. Multimedia Tools and Applications, 2011, 52 : 597 - 619
  • [29] A COMPRESSIVE-SENSING BASED WATERMARKING SCHEME FOR SPARSE IMAGE TAMPERING IDENTIFICATION
    Valenzise, G.
    Tagliasacchi, M.
    Tubaro, S.
    Cancelli, G.
    Barni, M.
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 1265 - +
  • [30] A hybrid-Sudoku based fragile watermarking scheme for image tampering detection
    Su, Guo-Dong
    Chang, Chin-Chen
    Chen, Chih-Cheng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (08) : 12881 - 12903