Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 24, pp 31713–31735 | Cite as

Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications

  • Pegah Nikbakht Bideh
  • Mojtaba Mahdavi
  • Shahram Etemadi Borujeni
  • Sima Arasteh
Article

Abstract

Recently, digital watermarking has become an important technique to preserve patients’ privacy in telemedicine applications. Since, medical information are highly sensitive, security of watermarked medical images becomes a critical issue in telemedicine applications. In this paper, two targeted attacks have been proposed against a key based color image watermarking scheme and also a non-key based one, in order to evaluate their security in telemedicine applications. The target schemes are SVD-based and QR-based color image watermarking algorithms, which their embedding procedures are quit the same. The proposed attacks exploit the prior knowledge of the watermarking algorithms to make changes in the exact embedding spaces. Thus, these changes would cause disruption in extraction procedure. Our experimental results show that the key based watermarking scheme is more secure than the non-key based one. This is because the proposed targeted attack needs to distort the key based watermarked images more than non-key based ones to remove the embedded watermarks. Our proposed targeted attacks also have more efficient performance in removing watermarks than other general attacks such as JPEG compression, Gaussian noise and etc. Finally, these attacks have been proposed to show the vulnerabilities of watermarking schemes in order to help the designers to implement more secure schemes.

Keywords

Digital watermarking Security analysis QR factorization Singular value decomposition Telemedicine applications Medical images 

References

  1. 1.
    Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-Int J Light Electron Optics 125(1):428–434CrossRefGoogle Scholar
  2. 2.
    Baker K (2005) Singular value decomposition tutorial. The Ohio State UniversityGoogle Scholar
  3. 3.
    Calagna M, Guo H, Mancini LV, Jajodia S (2006) A robust watermarking system based on SVD compression. Proc 2006 ACM Sym Appl Comput, ACM: 1341–1347Google Scholar
  4. 4.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, Morgan KaufmannGoogle Scholar
  5. 5.
    Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25(15):1769–1775CrossRefGoogle Scholar
  6. 6.
    Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944CrossRefGoogle Scholar
  7. 7.
    Ling HC, Phan RC-W, Heng SH (2011) "On the security of a hybrid SVD-DCT watermarking method based on LPSNR," advances in image and video technology. Springer, Berlin Heidelberg, pp 257–266Google Scholar
  8. 8.
    Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Int J Appl Math Info Sci: 1159–1166Google Scholar
  9. 9.
    Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102–112CrossRefGoogle Scholar
  10. 10.
    Meerwald P, Koidl C, Uhl A (2009) Attack on “watermarking method based on significant difference of wavelet coefficient quantization”. IEEE Trans Multimed 11(5):1037–1041CrossRefGoogle Scholar
  11. 11.
    Mehta R, Rajpal N (2013) A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model. Contemp Comput (IC3), 2013 Sixth Int Conf. IEEEGoogle Scholar
  12. 12.
    Mehta S, Nallusamy R, Marawar RV, Prabhakaran B (2013) A study of DWT and SVD based watermarking algorithms for patient privacy in medical images. Healthcare Info (ICHI), 2013 IEEE Int Conf. IEEEGoogle Scholar
  13. 13.
    Mohan BC, Kumar S (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15CrossRefGoogle Scholar
  14. 14.
    Nikbakht P, Mahdavi M (2015) Targeted watermark removal of a SVD-based image. IKT2015 7th Int Conf Info Knowledge Technol, IEEEGoogle Scholar
  15. 15.
    Nikbakht P, Mahdavi M (2015) Targeted dewatermarking of two non-blind SVD-based image watermarking schemes. Comput Knowledge Eng (ICCKE), 2015 5th Int Conf. IEEEGoogle Scholar
  16. 16.
    Pomponiu V, Cavagnino D (2011) Security analysis of SVD-based watermarking techniques. Int J Multimed Intell Sec 2(2):120–145Google Scholar
  17. 17.
    Rey C, Doërr G, Csurka G, Dugelay JL (2002) Toward generic image dewatermarking. Image Process. 2002. Proc. 2002 Int Conf IEEE 3Google Scholar
  18. 18.
    Rezazadeh S, Yazdi M (2006) A nonoblivious image watermarking system based on singular value decomposition and texture segmentation. Proc World Acad Sci, Eng Technol 13Google Scholar
  19. 19.
    Sadicoff M, Petrie MML (2004) .Digital watermark survey and classification. Sec LACCEI Int Latin Am Caribbean Conf Eng TechnolGoogle Scholar
  20. 20.
    C. Song, S. Sudirman, M. Merabti and D. Llewellyn-Jones, (2010) Analysis of digital image watermark attacks. Consum Commun Netw Conf (CCNC), 2010 7th IEEE. IEEEGoogle Scholar
  21. 21.
    Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18:116–124CrossRefGoogle Scholar
  22. 22.
    Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466MathSciNetzbMATHGoogle Scholar
  23. 23.
    Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235CrossRefGoogle Scholar
  24. 24.
    Sun S, Song W, Cong W (2009) DPCC and QR factorization-based color medical image authentication algorithm. Image Anal Signal Process, 2009. IASP 2009. Int Conf. IEEEGoogle Scholar
  25. 25.
    Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. Commun Mag, IEEE 39(8):118–126CrossRefGoogle Scholar
  26. 26.
    Zhou X, Ma J, Du W (2013) SoW: a hybrid DWT-SVD based secured image watermarking. Sensor Netw Sec Technol Privacy Commun Syst (SNS & PCS), 2013 Int Conf. IEEEGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Pegah Nikbakht Bideh
    • 1
  • Mojtaba Mahdavi
    • 1
  • Shahram Etemadi Borujeni
    • 1
  • Sima Arasteh
    • 1
  1. 1.Department of Computer engineeringUniversity of IsfahanIsfahanIran

Personalised recommendations