Tampering attacks on binary phase only filter-based watermarking schemes for image authentication

被引:1
|
作者
Cao, Gang [1 ]
Zhao, Yao
Ni, Rongrong
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
基金
美国国家科学基金会;
关键词
digital watermarking; image authentication; watermarking security; attack; image tampering; phase spectrum; magnitude spectrum;
D O I
10.1117/1.3579458
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentication. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated tampering attacks against them. We show how the attacker can easily tamper with a watermarked image without being detected. Experimental results demonstrate that our attacks are successful in tampering watermarked images. The watermarking schemes are proven to be fundamentally flawed. (C) 2011 Society of Photo-Optical Instrumentation Engineers (SPIE). [DOI: 10.1117/1.3579458]
引用
收藏
页数:10
相关论文
共 50 条
  • [1] On the fragility of the binary phase-only filter based digital image watermarking
    Zhu, Xiaohong
    Wu, Junfeng
    Sang, Jun
    [J]. REMOTE SENSING AND GIS DATA PROCESSING AND APPLICATIONS; AND INNOVATIVE MULTISPECTRAL TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6790
  • [2] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [3] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [4] A Tampering Authentication Algorithm for JPEG Image Based on Adaptive Digital Watermarking
    Liu, Guang-qi
    Zheng, Xiao-shi
    Zhao, Yan-ling
    Yang, Cheng-zhong
    Ding, Yuan-yu
    Liao, Lu-fang
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, : 332 - 335
  • [5] Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking
    Sang, Jun
    Alam, Mohammad S.
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2008, 57 (03) : 595 - 606
  • [6] Binary Image Authentication Based on Watermarking Algorithm
    Masoodifar, Behrang
    Hashemi, S. Mojtaba
    Zarei, Omid
    [J]. THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [7] A survey on fragile watermarking based image authentication schemes
    Raj, N. R. Neena
    Shreelekshmi, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) : 19307 - 19333
  • [8] A survey on fragile watermarking based image authentication schemes
    N. R. Neena Raj
    R. Shreelekshmi
    [J]. Multimedia Tools and Applications, 2021, 80 : 19307 - 19333
  • [9] Binary phase-only filter watermarking with quantized embedding
    Hu, Haibo
    Yi, Liu
    Ming, He
    [J]. World Academy of Science, Engineering and Technology, 2010, 42 : 637 - 640
  • [10] Binary phase-only filter watermarking with quantized embedding
    Haibo, Hu
    Yi, Liu
    Ming, He
    [J]. World Academy of Science, Engineering and Technology, 2010, 66 : 650 - 653