Cryptanalysis of a wavelet based watermarking scheme

被引:0
|
作者
Das, TK
Zhou, JY
Maitra, S
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, W Bengal, India
[2] Inst Infocomm Res, Infocomm Secur Dept, Singapore 119613, Singapore
来源
DIGITAL WATERMARKING | 2005年 / 3304卷
关键词
correlation; cryptanalysis; digital watermarking; wavelet transform;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we cryptanalyze the wavelet based watermarking scheme by Wang et al, 2002, By cryptanalysis we mean the removal of the watermark using a single watermarked copy which is equivalent to cipher text only jamming attack. The watermark embedding process replaces a particular middle frequency band of the host image (in wavelet domain) with the watermark. In the scheme, the key consists of three secrets: (i) the watermark, (ii) the random filter bank used for wavelet transform and (iii) the wavelet band where the watermark is inserted. First we observe that the secret random filter bank does not provide any security since it can be replaced by any filter bank from a large class. Further, it is possible to discover the secret wavelet band used to watermark the host image. Though in cryptography the random nature of secret key provides the security, in contrary here we show that the random nature of the watermark actually helps in identifying the secret wavelet band and consequently one can remove the watermarking signal from that band to mount the successful cryptanalytic attack.
引用
收藏
页码:192 / 203
页数:12
相关论文
共 50 条
  • [1] Cryptanalysis of wavelet tree quantization watermarking scheme
    Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata
    700 108, India
    [J]. 1600, 219-230 (2005):
  • [2] Cryptanalysis of "Wavelet Tree Quantization" watermarking scheme
    Das, TK
    Maitra, S
    [J]. DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 219 - 230
  • [3] Cryptanalysis of Wavelet Tree Quantization watermarking scheme
    Das, Tanmoy Kanti
    Maitra, Subhamoy
    [J]. Lect. Notes Comput. Sci., 1600, (219-230):
  • [4] Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme
    Chen, Lei
    Chen, Junxin
    Zhao, Geng
    Wang, Shihong
    [J]. IEEE ACCESS, 2019, 7 : 97549 - 97565
  • [5] Cryptanalysis of Chu's DCT based watermarking scheme
    Das, Tanmoy Kanti
    Maitra, Subhamoy
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (03) : 629 - 632
  • [6] A wavelet based image watermarking scheme
    Huo, Feifei
    Gao, Xinbo
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2573 - +
  • [7] Cryptanalysis of an improved fragile watermarking scheme
    Caragata, Daniel
    Andres Mucarquer, Juan
    Koscina, Mirko
    El Assad, Safwan
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2016, 70 (06) : 777 - 785
  • [8] Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme
    Teng, Lin
    Wang, Xingyuan
    Wang, Xiukun
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (06) : 540 - 547
  • [9] Cryptanalysis of a Digital Watermarking scheme based on Support Vector Regression
    Siddula, Madhuri
    Sanadhya, Somitra
    Subramanyam, A. V.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 1554 - 1559
  • [10] Wavelet based image adaptive watermarking scheme
    Kaewkamnerd, N
    Rao, KR
    [J]. ELECTRONICS LETTERS, 2000, 36 (04) : 312 - 313