IJCNIS Vol. 10, No. 6, 8 Jun. 2018
Cover page and Table of Contents: PDF (size: 546KB)
Full Text (PDF, 546KB), PP.60-67
Views: 0 Downloads: 0
Watermarking analysis, Chinese remainder theorem, Image authentication, Algorithm Analysis, Watermarking
Watermarking techniques are widely used for image authentication and copyright protection. Weaknesses of the “A novel CRT-based watermarking technique for authentication of multimedia contents,” [12] are analyzed in this study. 4 attacks are proposed to analysis of this method. These attacks are most significant bits, modulo number, tamper detection probability calculation and algorithm analysis attacks. The proposed attacks clearly show that the crt-based method is a data hiding method but this method is not used as image authentication method. The title of presented method in Ref. [12] include “authentication” but the authors of Ref. [12] evaluated their method in view of copyright protection. The fragile watermarking methods for image authentication should consist of watermark generation, watermark embedding, watermark extraction and tamper detection but Ref. [12] has no watermark generation, tamper detection and tampered area localization algorithms. The proposed attacks are demonstrated that Ref. [12] cannot be utilized as an image authentication method and Ref. [12] is not effectively coded.
Türker TUNCER, "Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.6, pp.60-67, 2018. DOI:10.5815/ijcnis.2018.06.06
[1]H.M. Al-Otum, Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique, J. Vis. Commun. Image Represent. 25 (2014) 1064–1081.
[2]C.S. Chan, An image authentication method by applying hamming code, Pattern Recogn. Lett. 32 (2011) 1679–1690.
[3]J.H. Chen, W.Y. Chen, C.H. Chen, Identification recovery scheme using quick response (QR) code and watermarking technique, Appl. Math. Inform. Sci. 8 (2014) 585–596.
[4]A. Tareef, A. Al-Ani, A highly secure oblivious sparse coding-based watermarking system for ownership verification, Expert Syst. Appl. 42 (4) (2015) 2224–2233.
[5]T. Tuncer, A probabilistic image authentication method based on chaos, Multimedia Tools and Applications (2018), 1-18.
[6]W.C. Wu, Z.W. Lin, An image content protection and tampering localization scheme using singular values, in: Proceedings of the 3rd International Scientific Conference on Engineering and Applied Sciences, Okinawa Japan, July 2015, pp. 238–247.
[7]W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication, Expert Syst. Appl. 36 (2009) 1300–1307.
[8]T. Tuncer, A novel image authentication method based on singular value decomposition, Journal of the Faculty of Engineering and Architecture of Gazi University, 32,3, (2017), 877-886.
[9]E. Avci, T. Tuncer, D. Avci, A Novel Reversible Data Hiding Algorithm Based on Probabilistic XOR Secret Sharing in Wavelet Transform Domain. Arabian Journal for Science and Engineering, (2016), 1-9.
[10]T. Tuncer, E. Avci, Data Hiding Application with Gokturk Alphabet Based Visual Cryptography Method, Journal of the Faculty of Engineering and Architecture of Gazi University, Vol 31, No 3, pp. 781-789,2016.
[11]C. Qin, X. Zhang, “Effective reversible data hiding in encrypted image with privacy protection for image content”,Journal of Visual Communication and Image Representation, 31 (2015),154-164.
[12]J. C. Patra, A. Karthik, C. Bornand, A novel CRT-based watermarking technique for authentication of multimedia contents, Digital Signal Processing 20,(2010), pp. 442–453.
[13]J. C. Patra, J.E. Phua, C. Bornand, A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression, Digital Signal Processing 20,(2010), pp. 1597–1611.
[14]T.-S. Nguyen, C.-C. Chang, X.-Q. Yang, A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain, International Journal of Electronics and Communications (AEü), 70,(2016), pp.1055-1061.
[15]W. Zhou, L. Yu, Z. Wang, M. Wu, T. Luo, L. Sun, Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images, International Journal of Electronics and Communications (AEü), 70,(2016), pp. 77–84.
[16]Y.-C. Hu, C.-C. Lo, W.-L. Chen, Probability-based reversible image authentication scheme for image demosaicking, Future Generation Computer Systems, 62, (2016), pp. 92-103.
[17]X. Qi, X. Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, J. Vis. Commun. Image R., 30, (2015), pp. 312-327.
[18]D. Caragata, J. A. Mucarquer, M. Koscina, S. E. Assad, Cryptanalysis of an improved fragile watermarking scheme, International Journal of Electronics and Communications (AEü), 70, (2016), pp. 777-785.
[19]Teng L, Wang X, Wang X. Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme, International Journal of Electronics and Communications (AEü), (2013), 67(6),540–547.
[20]D. Caragata, S. E. Assad, M. Luduena, An improved fragile watermarking algorithm for JPEG images, International Journal of Electronics and Communications (AEü), 69, (2015), pp. 1783-1794.
[21]H. Wang, K. Ding, C. Liao, Chaotic watermarking scheme for authentication of JPEG images. In: International symposium on biometrics and security technologies. 2008. pp. 1–4.
[22]M. Li, J. Zhang, W. Wen, Cryptanalysis and improvement of a binary watermark-based copyright protection scheme for remote sensing images, Optik 125 (2014) 7231–7234.
[23]P. Zhu, F. Jia, J.L. Zhang, A copyright protection watermarking algorithm for remote sensing image based on binary image watermark, Optik 124 (2013) 4177–4181.
[24]A. Ahmad, G.R. Sinha, N. Kashyap, 3-Level DWT Image Watermarking Against Frequency and Geometrical Attacks, I.J. Computer Network and Information Security, 2014, 12, 58-63.
[25]A. Bansal, S.K. Muttoo, V. Kumar, Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique, I. J. Computer Network and Information Security, 2016, 8, 39-46.
[26]S. Dogan, A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map, I. J. Computer Network and Information Security, 2018, 1, 1-9.
[27]A. Tiwari, M. Sharma, Semifragile Watermarking Schemes for Image Authentication- A Survey, I. J. Computer Network and Information Security, 2012, 2, 43-49.
[28]R. Christian, D. Jean-Luc, A survey of watermarking algorithms for image authentication, EURASIP J. Appl. Signal Process., 6, (2002) 613–621.