Tampering with a watermarking-based image authentication scheme

被引:28
|
作者
Phan, Raphael C. -W. [1 ]
机构
[1] Univ Loughborough, Loughborough LE11 3TU, Leics, England
关键词
encoding; watermarking; information hiding; digital rights management; image authentication; tampering; ownership;
D O I
10.1016/j.patcog.2008.05.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3493 / 3496
页数:4
相关论文
共 50 条
  • [31] A hybrid-Sudoku based fragile watermarking scheme for image tampering detection
    Guo-Dong Su
    Chin-Chen Chang
    Chih-Cheng Chen
    [J]. Multimedia Tools and Applications, 2021, 80 : 12881 - 12903
  • [32] A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection
    Fedoseev V.
    Denisova A.
    [J]. SN Computer Science, 5 (4)
  • [33] Superpixel-Based Watermarking Scheme for Image Authentication and Recovery
    Qiao, Xiumei
    Ni, Rongrong
    Zhao, Yao
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 160 - 173
  • [34] Image Authentication Scheme Based on Self-embedding Watermarking
    Cruz-Ramos, Clara
    Reyes-Reyes, Rogelio
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    [J]. PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, PROCEEDINGS, 2009, 5856 : 1005 - 1012
  • [35] A content-based fragile watermarking scheme for image authentication
    Kim, MA
    Lee, WH
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 258 - 265
  • [36] A SVD-based fragile watermarking scheme for image authentication
    Byun, SC
    Lee, SK
    Tewfik, AH
    Ahn, BH
    [J]. DIGITAL WATERMARKING, 2002, 2613 : 170 - 178
  • [37] A watermarking scheme based on rotating vector for image content authentication
    Jianjing Fu
    Jiafa Mao
    Dawen Xue
    Deren Chen
    [J]. Soft Computing, 2020, 24 : 5755 - 5772
  • [38] A watermarking scheme based on rotating vector for image content authentication
    Fu, Jianjing
    Mao, Jiafa
    Xue, Dawen
    Chen, Deren
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5755 - 5772
  • [39] A New Card Authentication Scheme Based on Image Watermarking and Encryption
    Peng, Xinxin
    Lu, Jianfeng
    Li, Li
    Chang, Chin-Chen
    Zhou, Qili
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 358 - 369
  • [40] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)