Skip to main content
Log in

Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we present two ambiguity attacks on a watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD). These attacks result in the extracted watermark differing from the embedded watermark. In the first attack, an attacker can extract their watermark from any watermarked image using this algorithm. However, in the second attack, when the watermarked image is rewatermarked by the attacker’s watermark, the extracted watermark will be visually similar to the attacker’s watermark. Consequently, this algorithm is insecure and cannot be used for ownership verification and copyright protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Kundu N, Debnath S, Choudhury T (2020) Post-quantum digital signature scheme based on multivariate cubic problem. J Inf Sec Appl 53:102512

    Google Scholar 

  2. Loukhaoukha K, Chouinard J-Y (2009) A new image watermarking algorithm based on wavelet transform. In: Proceedings of Canadian conference on electrical and computer engineering, pp. 229–234

  3. Najafi E, Loukhaoukha K (2019) Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Sec Appl 44:144–156

    Google Scholar 

  4. Park Y, Kang H, Yamaguchi K, Kobayashi K (2008) Watermarking for tamper detection and recovery. IEICE Electron Express 5(17):689–96

    Article  Google Scholar 

  5. Zeki AM, Manaf AA (2009) A novel digital watermarking technique based on ISB (Intermediate Significant Bit). Proc World Acad Sci Eng Technol 38:1080–1087

    Google Scholar 

  6. Nguyen TT, Tuan HD (2008) A Modified Spatial Spread Spectrum Method for Digital Image Watermarking. In: International conference on communications and electronics, pp. 282–287

  7. Loukhaoukha K, Chouinard J-Y (2010) On the security of ownership watermarking of digital images based on SVD decomposition. J Electron Imaging 19:013007 (pp. 9)

  8. Pai Y-T, Ruan S-J (2007) A high quality robust digital watermarking by smart distribution technique and effective embedded scheme. IEICE Trans Fundam Electron Commun Comput Sci E90A:597–605

    Article  Google Scholar 

  9. Tao L, Kwan HK (2009) Novel DCT-based real-valued discrete Gabor transform and its fast algorithms. IEEE Trans Signal Process 57:2151–2164

    Article  MathSciNet  Google Scholar 

  10. Liu R, Tan T (2002) A SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4:121–128

    Article  Google Scholar 

  11. Loukhaoukha K, Nabti M, Zebbiche K (2014) A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron Rev 22:45–54

    Article  Google Scholar 

  12. Abdallah E, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms. J Electron Imaging 16:1–9

    Article  Google Scholar 

  13. Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 13:1170–1182

    Article  Google Scholar 

  14. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59:3060–3063

    Article  Google Scholar 

  15. Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circ Syst Video Technol 15:96–102

    Article  Google Scholar 

  16. Loukhaoukha K (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm’’. Digit Signal Process 23:1334

    Article  Google Scholar 

  17. Loukhaoukha K (2012) On The Security of Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm. J Inf Hiding Multimed Signal Process 3:35–141

    Google Scholar 

  18. Rykaczewski R (2007) Comments on an SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 9:421–423

    Article  Google Scholar 

  19. Zhang TX, Zheng WM, Lu ZM, Liu BB (2008) Comments on “A semi-blind digital watermarking scheme based on singular value decomposition”. In: Proceedings of international conference on intelligent systems design and applications, pp. 123–126

  20. Xiao L, Wei Z, Ye J (2008) Comments on “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition” and theoretical analysis. J Electron Imaging 17

  21. Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Appl 77:26845–26879

    Article  Google Scholar 

  22. Shieh J-M, Lou D-C, Chang M-C (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Stand Interfaces 28:428–440

    Article  Google Scholar 

  23. Ganic E, Eskicioglu A (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14:43004 (pp. 9)

  24. Asnaoui KE (2020) Image Compression Based on Block SVD Power Method. J Intell Syst 29:1345–1359

    Google Scholar 

  25. Zhu L, Song H, Zhang X, Yan M, Zhang T, Wang X, Xu J (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629

    Article  Google Scholar 

  26. Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79:1865–1886

    Article  Google Scholar 

  27. Rathore NK, Jain NK, Shukla PK, Rawat U, Dubey R (2021) Image Forgery Detection Using Singular Value Decomposition with Some Attacks. Nat Acad Sci Lett 44:331–338

    Article  MathSciNet  Google Scholar 

  28. Nguyen T-S (2021) Fragile watermarking for image authentication based on DWT-SVD-DCT techniques. Multimed Tools Appl 80:25107–25119

    Article  Google Scholar 

  29. Loukhaoukha K, Refaey A, Zebbiche K (2016) Comments on “A robust color image watermarking with singular value decomposition method. Adv Eng Softw 93:44–46

    Article  Google Scholar 

  30. Ling H-C, Phan RC-W, Heng S-H (2011) On the security of ownership watermarking of digital images based on singular value decomposition. J Electron Imaging 20:010501 (pp. 2)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Loukhaoukha.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El Maadi, A., Loukhaoukha, K., Benmami, M. et al. Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18980-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18980-9

Keywords

Navigation