Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery

In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental results indicate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspections, respectively. The proposed attacks demonstrate that this watermarking algorithm is fundamentally flawed in that the attacker can tamper a watermarked image easily without being detected. In this paper, a four-scanning attack aimed to Lin et al.'s watermarking method is presented to create tampered images. Furthermore, in case they use encryption to protect their 3-tuple-watermark, we proposed a blind attack to tamper watermarked images without being detected. Experimental results are given to support and enhance our conclusions, and demonstrate that our attacks are successful in tampering watermarked images.

[1]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[2]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[3]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[4]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[6]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[7]  Robert H. Deng,et al.  Security of an ill-posed operator for image authentication , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[9]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[10]  A. Murat Tekalp,et al.  Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.

[11]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[12]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[13]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[14]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Steve McLaughlin,et al.  Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[17]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[18]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[19]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[20]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[21]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[22]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[23]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[24]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[25]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[26]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[27]  P. Bao,et al.  Image adaptive watermarking using wavelet domain singular value decomposition , 2005 .