On the Security of Chaos-Based Watermarking Scheme for Secure Communication

被引:1
|
作者
Ahmad, Musheer [1 ]
AlSharari, Hamed D. [2 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi 110025, India
[2] AlJouf Univ, Coll Engn, Dept Elect Engn, Sakakah, AlJouf, Saudi Arabia
关键词
Image watermarking; Chaotic map; Security; Cryptanalysis; Chosen-plaintext attack; IMAGE WATERMARKING; CRYPTANALYSIS; EFFICIENT;
D O I
10.1007/978-981-10-3153-3_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new digital image watermarking scheme based on chaotic map was proposed to hide the sensitive information known as watermark. The authors claimed that the scheme is efficient, secure, and highly robust against various attacks. In this paper, the inherent security loopholes of the watermarking embedding and extraction processes are unveiled. The cryptanalysis of watermarking scheme is presented to demonstrate that the scheme is not robust and secure against the proposed attack. Specifically, with chosen host image and chosen watermarks, the successful recovery of securely embedded watermark from received watermarked image is possible without any knowledge of secret key. The simulation analysis of proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of anticipated watermarking scheme.
引用
收藏
页码:313 / 321
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme
    Chen, Lei
    Chen, Junxin
    Zhao, Geng
    Wang, Shihong
    [J]. IEEE ACCESS, 2019, 7 : 97549 - 97565
  • [2] A chaos-based fragile watermarking scheme with recovery
    He, Hongjie
    Zhang, Jiashu
    Chen, Fan
    [J]. FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2007, : 303 - +
  • [3] A Design of a Method of Chaos-based Secure Communication
    He, Hong
    Dong, Hong
    Yang, Tong
    He, Lin
    Wu, Yi
    [J]. ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 508 - +
  • [4] On the design of chaos-based secure communication systems
    Zaher, Ashraf A.
    Abu-Rezq, Abdulnasser
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (09) : 3721 - 3737
  • [5] A chaos-based secure voice communication system
    Tang, K. W.
    Tang, Wallace K. S.
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY - (ICIT), VOLS 1 AND 2, 2005, : 635 - 640
  • [6] Breaking a chaos-based secure communication scheme designed by an improved modulation method
    Li, SJ
    Alvarez, G
    Chen, GR
    [J]. CHAOS SOLITONS & FRACTALS, 2005, 25 (01) : 109 - 120
  • [7] A chaos-based self-embedding secure watermarking algorithm
    He Hong-Jie
    Zhang Jia-Shu
    [J]. ACTA PHYSICA SINICA, 2007, 56 (06) : 3092 - 3100
  • [8] Security of chaos-based secure communications in a large community
    Wang Kai
    Pei Wen-Jiang
    Zhou Jian-Tao
    Zhang Yi-Feng
    Zhou Si-Yuan
    [J]. ACTA PHYSICA SINICA, 2011, 60 (07)
  • [9] New encoding model for chaos-based secure communication
    Hoang, TM
    Nakagawa, M
    [J]. JOURNAL OF THE PHYSICAL SOCIETY OF JAPAN, 2006, 75 (03)
  • [10] Security Analysis of a Chaos-Based Image Encryption Scheme
    Ergun, Salih
    [J]. 2018 19TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON'18), 2018, : 58 - 61