Skip to main content

2017 | OriginalPaper | Buchkapitel

On the Security of Chaos-Based Watermarking Scheme for Secure Communication

verfasst von : Musheer Ahmad, Hamed D. AlSharari

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A new digital image watermarking scheme based on chaotic map was proposed to hide the sensitive information known as watermark. The authors claimed that the scheme is efficient, secure, and highly robust against various attacks. In this paper, the inherent security loopholes of the watermarking embedding and extraction processes are unveiled. The cryptanalysis of watermarking scheme is presented to demonstrate that the scheme is not robust and secure against the proposed attack. Specifically, with chosen host image and chosen watermarks, the successful recovery of securely embedded watermark from received watermarked image is possible without any knowledge of secret key. The simulation analysis of proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of anticipated watermarking scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics, 709–716 (2005). Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics, 709–716 (2005).
2.
Zurück zum Zitat Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer–seller watermarking protocol. IEEE Transaction on Image Processing 13(12), 1618–1626 (2004). Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer–seller watermarking protocol. IEEE Transaction on Image Processing 13(12), 1618–1626 (2004).
3.
Zurück zum Zitat Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66(3), 337–355 (1998). Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66(3), 337–355 (1998).
4.
Zurück zum Zitat Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Second Edition, The Morgan Kaufmann Publishers (2008). Cox, I.J., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Second Edition, The Morgan Kaufmann Publishers (2008).
5.
Zurück zum Zitat Zhang, X., Shuozhong W.: Fragile watermarking scheme using a hierarchical mechanism. Signal processing 89(4), 675–679 (2009). Zhang, X., Shuozhong W.: Fragile watermarking scheme using a hierarchical mechanism. Signal processing 89(4), 675–679 (2009).
6.
Zurück zum Zitat Wang, X.Y., Yang, H.Y., Cui, C.Y.: An SVM-based robust digital image watermarking against desynchronization attacks. Signal Processing 88(9), 2193–2205 (2008). Wang, X.Y., Yang, H.Y., Cui, C.Y.: An SVM-based robust digital image watermarking against desynchronization attacks. Signal Processing 88(9), 2193–2205 (2008).
7.
Zurück zum Zitat Cox, I.J., Killian, J., Leighton, T.: A secure, robust watermark for multimedia. In: Information Hiding. Springer Berlin Heidelberg, 185–206 (1996). Cox, I.J., Killian, J., Leighton, T.: A secure, robust watermark for multimedia. In: Information Hiding. Springer Berlin Heidelberg, 185–206 (1996).
8.
Zurück zum Zitat Liu, J.L., Lou, D.C., Chang, M.C., Tso, H.K.: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces, 28(3), 356–367 (2006). Liu, J.L., Lou, D.C., Chang, M.C., Tso, H.K.: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces, 28(3), 356–367 (2006).
9.
Zurück zum Zitat Shieh, J.M., Lou, D.C., Chang, M.C.: A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces, 28(4), 428–440 (2006). Shieh, J.M., Lou, D.C., Chang, M.C.: A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces, 28(4), 428–440 (2006).
10.
Zurück zum Zitat Tao, P., Eskicioglu, A.M.: A robust multiple watermarking scheme in the discrete wavelet transform domain. In: Proceedings of SPIE 5601 Internet Multimedia Management Systems V, 133–144) (2004). Tao, P., Eskicioglu, A.M.: A robust multiple watermarking scheme in the discrete wavelet transform domain. In: Proceedings of SPIE 5601 Internet Multimedia Management Systems V, 133–144) (2004).
11.
Zurück zum Zitat Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561–570 (2007). Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561–570 (2007).
12.
Zurück zum Zitat Mohammad, A.A., Alhaj, A., Shaltaf, S.: An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing 88(9), 2158–2180 (2008). Mohammad, A.A., Alhaj, A., Shaltaf, S.: An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing 88(9), 2158–2180 (2008).
13.
Zurück zum Zitat Bhatnagar, G., Raman, B.: Encryption based robust watermarking in fractional wavelet domain. In: Recent Advances in Multimedia Signal Processing and Communications, Springer Berlin Heidelberg, 375–416 (2009). Bhatnagar, G., Raman, B.: Encryption based robust watermarking in fractional wavelet domain. In: Recent Advances in Multimedia Signal Processing and Communications, Springer Berlin Heidelberg, 375–416 (2009).
14.
Zurück zum Zitat Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10), 840–847 (2011). Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10), 840–847 (2011).
15.
Zurück zum Zitat Chang, C.C., Chen, K.N., Lee, C.F., Liu, L.J.: A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 84(9), 1462–1470 (2011). Chang, C.C., Chen, K.N., Lee, C.F., Liu, L.J.: A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 84(9), 1462–1470 (2011).
16.
Zurück zum Zitat Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dynamics 73(3), 1469–1474 (2013). Jamal, S.S., Shah, T., Hussain, I.: An efficient scheme for digital watermarking using chaotic map. Nonlinear Dynamics 73(3), 1469–1474 (2013).
17.
Zurück zum Zitat Aslantas, V., Dogru, M.: A new SVD based fragile image watermarking by using genetic algorithm. In: Sixth International Conference on Graphic and Image Processing, 94431H-94431H (2014). Aslantas, V., Dogru, M.: A new SVD based fragile image watermarking by using genetic algorithm. In: Sixth International Conference on Graphic and Image Processing, 94431H-94431H (2014).
18.
Zurück zum Zitat Ansari, I.A., Pant, M., Ahn, C.W.: ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik 127(14), 5711–5721 (2016). Ansari, I.A., Pant, M., Ahn, C.W.: ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik 127(14), 5711–5721 (2016).
19.
Zurück zum Zitat Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Transactions on Signal Processing 53(2), 768–775 (2005). Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Transactions on Signal Processing 53(2), 768–775 (2005).
20.
Zurück zum Zitat Chou, J.S., Chen, Y., Chan, C.J.: Cryptanalysis of Hwang-Chang’s a time-stamp protocol for digital watermarking. IACR Cryptology ePrint Archive (2007). Chou, J.S., Chen, Y., Chan, C.J.: Cryptanalysis of Hwang-Chang’s a time-stamp protocol for digital watermarking. IACR Cryptology ePrint Archive (2007).
21.
Zurück zum Zitat Ting, G.C.W., Goi, B.M., Heng, S.H.: Attacks on a robust watermarking scheme based on self-reference image. Computer Standards & Interfaces 30(1), 32–35 (2008). Ting, G.C.W., Goi, B.M., Heng, S.H.: Attacks on a robust watermarking scheme based on self-reference image. Computer Standards & Interfaces 30(1), 32–35 (2008).
22.
Zurück zum Zitat Ting, G.C.W., Goi, B.M., Heng, S.H.: Attack on a semi-blind watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 31(2), 523–525 (2009). Ting, G.C.W., Goi, B.M., Heng, S.H.: Attack on a semi-blind watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 31(2), 523–525 (2009).
23.
Zurück zum Zitat He, H., Zhang, J.: Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommunication Systems 49(2), 231–238 (2012). He, H., Zhang, J.: Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommunication Systems 49(2), 231–238 (2012).
24.
Zurück zum Zitat Teng, L., Wang, X., Wang, X.: Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications 67(6), 540–547 (2013). Teng, L., Wang, X., Wang, X.: Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications 67(6), 540–547 (2013).
25.
Zurück zum Zitat Caragata, D., Mucarquer, J.A., Koscina, M., El Assad, S.: Cryptanalysis of an improved fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 70(6), 777–785 (2016). Caragata, D., Mucarquer, J.A., Koscina, M., El Assad, S.: Cryptanalysis of an improved fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 70(6), 777–785 (2016).
26.
Zurück zum Zitat Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Contemporary Computing. Springer Berlin Heidelberg, 81–91, (2011). Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Contemporary Computing. Springer Berlin Heidelberg, 81–91, (2011).
27.
Zurück zum Zitat Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Security in Computing and Communication. Springer-Verlag Berlin Heidelberg, CCIS 467, 173–181, (2014). Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Security in Computing and Communication. Springer-Verlag Berlin Heidelberg, CCIS 467, 173–181, (2014).
28.
Zurück zum Zitat Ahmad, M., Ahmad, F.: Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications. Springer International Publishing Switzerland, AISC 327, 481–488 (2015). Ahmad, M., Ahmad, F.: Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications. Springer International Publishing Switzerland, AISC 327, 481–488 (2015).
29.
Zurück zum Zitat Ahmad, M., Khan, I.R., Alam, S.: Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System. In: Emerging ICT for Bridging the Future. Springer International Publishing Switzerland, AISC 338, 381–388 (2015). Ahmad, M., Khan, I.R., Alam, S.: Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System. In: Emerging ICT for Bridging the Future. Springer International Publishing Switzerland, AISC 338, 381–388 (2015).
30.
Zurück zum Zitat Sharma, P.K., Kumar, A., Ahmad, M.: Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling. In: International Congress on Information and Communication Technology. Springer Singapore, AISC 439, 281–289 (2016). Sharma, P.K., Kumar, A., Ahmad, M.: Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling. In: International Congress on Information and Communication Technology. Springer Singapore, AISC 439, 281–289 (2016).
31.
Zurück zum Zitat May R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467, (1967). May R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467, (1967).
32.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. New York, Wiley (1996). Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. New York, Wiley (1996).
Metadaten
Titel
On the Security of Chaos-Based Watermarking Scheme for Secure Communication
verfasst von
Musheer Ahmad
Hamed D. AlSharari
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_31

Premium Partner