Tampering with a watermarking-based image authentication scheme

We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership.

[1]  Qiuqi Ruan,et al.  Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..

[2]  Shyi-Chyi Cheng,et al.  Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis , 2007, Pattern Recognit..

[3]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  Yi-Ta Wu,et al.  Digital watermarking based on chaotic map and reference register , 2007, Pattern Recognit..

[5]  Chen He,et al.  Erratum to: Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformation [Pattern Recognition 38 (12) 2530] , 2006, Pattern Recognit..

[6]  Guorui Feng,et al.  Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform , 2005, Pattern Recognit..

[7]  Chang Dong Yoo,et al.  Localized image watermarking based on feature points of scale-space representation , 2004, Pattern Recognit..

[8]  Anthony Tung Shuen Ho,et al.  A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..

[9]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[10]  Frank Y. Shih,et al.  An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..

[11]  Braham Barkat,et al.  Multiresolution fragile watermarking using complex chirp signals for content authentication , 2006, Pattern Recognit..

[12]  Nikolaos G. Bourbakis,et al.  Lossless compression and information hiding in images , 2004, Pattern Recognit..

[13]  Chaur-Heh Hsieh,et al.  A novel image watermarking scheme based on amplitude attack , 2007, Pattern Recognit..

[14]  Chin-Hsing Chen,et al.  A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..

[15]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[16]  Shuenn-Shyang Wang,et al.  Automatic image authentication and recovery using fractal code embedding and image inpainting , 2008, Pattern Recognit..

[17]  Po-Wei Hsu,et al.  A robust associative watermarking technique based on similarity diagrams , 2007, Pattern Recognit..

[18]  Miroslaw Pawlak,et al.  Circularly orthogonal moments for geometrically robust image watermarking , 2007, Pattern Recognit..

[19]  Gernot Kubin,et al.  Speaker identification security improvement by means of speech watermarking , 2007, Pattern Recognit..

[20]  Chin-Ming Hsu,et al.  A data-hiding technique with authentication, integration, and confidentiality for electronic patient records , 2002, IEEE Transactions on Information Technology in Biomedicine.

[21]  Qijun Zhao,et al.  A PCA-based watermarking scheme for tamper-proof of web pages , 2005, Pattern Recognit..

[22]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[23]  Qijun Zhao,et al.  PCA-based web page watermarking , 2007, Pattern Recognit..

[24]  Mauro Barni,et al.  Joint near-lossless compression and watermarking of still images for authentication and tamper localization , 2006, Signal Process. Image Commun..