Tampering attacks on binary phase only filter–based watermarking schemes for image authentication

نویسندگان

  • Gang Cao
  • Yao Zhao
  • Rongrong Ni
چکیده

Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentica-tion. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated tampering attacks against them. We show how the attacker can easily tamper with a water-marked image without being detected. Experimental results demonstrate that our attacks are successful in tampering watermarked images. The watermarking schemes are proven to be fundamentally flawed. C 2011 Society of Photo-Optical Instrumentation Engineers (SPIE). 1 Introduction In today's digital age, digital image manipulation becomes much easier and prevalent. Seeing from digital images becomes no longer believable. It becomes significant to verify the content integrity and authenticity of digital images. The watermarking-based image authentication technique is developed as one solution for such a requirement. Many published authentication watermarking schemes are in Refs. 1–12. The basic task of a watermark-based image authentication system is to identify whether the image data has been tampered. Unacceptable distortion on the data should be alerted while legitimate manipulation should be permitted. 13 An au-thentication scheme usually consists of protection and verification processes. For protection, the watermark, which can be considered as a compact representation of image content, is generated and hidden into the image data itself. For verification , the hidden watermark is extracted and compared with the regenerated one. Inferior matching between them implies the occurrence of malicious tamper. Recently, a self-authentication watermarking scheme based on Fourier phase signature has been proposed in Ref. 1, then improved in Ref. 2, and widely applied in Refs. 3–5. The BPOF watermark is generated from an image's Fourier phase spectrum and then hidden back into the magnitude spectrum. A watermark detector evaluates the correlation between phase information and the extracted BPOF watermark to identify whether the received watermarked image has been tampered or not. The BPOF-based watermarking scheme primarily proposed in Ref. 1 is referred to as the basic BPOF scheme throughout this paper. To improve the authentication's reliability, Sang et al. proposed to use only the low-frequency range of the Fourier spectrum to generate and embed a watermark, 2 which is referred to as the improved BPOF scheme. For an authentication watermarking scheme, security refers the ability to resist intentional tampering by opponents

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

A quantization-based semi-fragile watermarking scheme for image content authentication

1047-3203/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.jvcir.2010.12.005 ⇑ Corresponding author. Fax: +1 435 7973265. E-mail address: [email protected] (X. Qi). This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization. The proposed scheme uses a non-traditional quantization method to modify one chosen approximation coeff...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Binary Phase-Only Filter Watermarking with Quantized Embedding

The binary phase-only filter digital watermarking embeds the phase information of the discrete Fourier transform of the image into the corresponding magnitudes for better image authentication. The paper proposed an approach of how to implement watermark embedding by quantizing the magnitude, with discussing how to regulate the quantization steps based on the frequencies of the magnitude coeffic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011